ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET
IEEE Transactions on Information Forensics and Security
◽
10.1109/tifs.2022.3140657
◽
2022
◽
pp. 1-1
Author(s):
Yafang Yang
◽
Lei Zhang
◽
Yunlei Zhao
◽
Kim-Kwang Raymond Choo
◽
Yan Zhang
Keyword(s):
Warning System
◽
Privacy Preserving
◽
Authentication Scheme
◽
Safety Warning
Download Full-text
Related Documents
Cited By
References
APPAS: A Privacy-Preserving Authentication Scheme Based on Pseudonym Ring in VSNs
IEEE Access
◽
10.1109/access.2019.2900593
◽
2019
◽
Vol 7
◽
pp. 69936-69946
◽
Cited By ~ 2
Author(s):
Tianhan Gao
◽
Xinyang Deng
◽
Qingshan Li
◽
Mario Collotta
◽
Ilsun You
Keyword(s):
Privacy Preserving
◽
Authentication Scheme
Download Full-text
A Privacy-Preserving Authentication Scheme for VANETs based on Consortium Blockchain
2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall)
◽
10.1109/vtc2020-fall49728.2020.9348497
◽
2020
◽
Author(s):
Yujian Zhang
◽
Fei Tong
◽
Yuwei Xu
◽
Jun Tao
◽
Guang Cheng
Keyword(s):
Privacy Preserving
◽
Authentication Scheme
Download Full-text
Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0
Science China Information Sciences
◽
10.1007/s11432-020-2975-6
◽
2021
◽
Vol 65
(1)
◽
Author(s):
Chenyu Wang
◽
Ding Wang
◽
Guoai Xu
◽
Debiao He
Keyword(s):
Industry 4.0
◽
User Authentication
◽
Privacy Preserving
◽
Authentication Scheme
◽
Forward Secrecy
◽
User Authentication Scheme
Download Full-text
Novel Privacy Preserving Authentication Scheme Based on Physical Layer Signatures for Mobile Payments
SN Computer Science
◽
10.1007/s42979-021-00509-8
◽
2021
◽
Vol 2
(2)
◽
Author(s):
D. L. Lavanya
◽
R. Ramaprabha
◽
B. Thangapandian
◽
K. Gunaseelan
Keyword(s):
Physical Layer
◽
Privacy Preserving
◽
Authentication Scheme
◽
Mobile Payments
Download Full-text
Sensor modeling and data fusion for a safety warning system in hydrogen-based vehicles
2009 IEEE International Workshop on Robotic and Sensors Environments
◽
10.1109/rose.2009.5355993
◽
2009
◽
Cited By ~ 1
Author(s):
Sergio Saponara
◽
Alessandro Forconi
◽
Pierangelo Terreni
Keyword(s):
Data Fusion
◽
Warning System
◽
Safety Warning
◽
Sensor Modeling
Download Full-text
Design and Implementation of a Hydrological Safety Warning System Based on ZigBee
Proceedings of the 2017 International Conference on Manufacturing Engineering and Intelligent Materials (ICMEIM 2017)
◽
10.2991/icmeim-17.2017.51
◽
2017
◽
Author(s):
Sai Cen
◽
Fei Xu
◽
Meng Gui
Keyword(s):
Warning System
◽
Design And Implementation
◽
Safety Warning
◽
Hydrological Safety
Download Full-text
Strong privacy preserving authentication scheme for unmanned cars
2018 IEEE International Conference on Consumer Electronics (ICCE)
◽
10.1109/icce.2018.8326170
◽
2018
◽
Author(s):
Sangil Jeon
◽
Jaewon Noh
◽
Jeehyeong Kim
◽
Sunghyun Cho
Keyword(s):
Privacy Preserving
◽
Authentication Scheme
Download Full-text
LPPA: A Lightweight Privacy-Preserving Authentication Scheme for the Internet of Drones
10.1109/icct52962.2021.9658014
◽
2021
◽
Author(s):
Yuyang Cheng
◽
Shiyuan Xu
◽
Miao Zang
◽
Weimin Kong
Keyword(s):
Privacy Preserving
◽
Authentication Scheme
◽
The Internet
Download Full-text
Application of Vision-based Safety Warning System to Haeundae Beach, Korea
Journal of Coastal Research
◽
10.2112/si91-044.1
◽
2019
◽
Vol 91
(sp1)
◽
pp. 216
◽
Cited By ~ 2
Author(s):
Jooyong Lee
◽
Jisoo Park
◽
Inchul Kim
◽
Dae Young Kang
Keyword(s):
Warning System
◽
Safety Warning
Download Full-text
Proposed Efficient Conditional Privacy-Preserving Authentication Scheme for V2V and V2I Communications Based on Elliptic Curve Cryptography in Vehicular Ad Hoc Networks
Communications in Computer and Information Science - Advances in Cyber Security
◽
10.1007/978-981-33-6835-4_39
◽
2021
◽
pp. 588-603
Author(s):
Mahmood A. Al-shareeda
◽
Mohammed Anbar
◽
Selvakumar Manickam
◽
Iznan H. Hasbullah
◽
Ayman Khalil
◽
...
Keyword(s):
Ad Hoc Networks
◽
Elliptic Curve
◽
Elliptic Curve Cryptography
◽
Vehicular Ad Hoc Networks
◽
Ad Hoc
◽
Privacy Preserving
◽
Authentication Scheme
◽
Hoc Networks
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close