[1]
|
F. Wang, D. Zeng and L. Yang, “Smart Cars on Smart Roads: An IEEE Intelligent Transportation Systems Society Update,” IEEE Pervasive Computing, Vol. 5, No. 4, 2006, pp. 68-69. doi:10.1109/MPRV.2006.84
|
[2]
|
H. Oh, C. Yae, D. Ahn and H. Cho, “5.8 GHz DSRC Packet Communication System for ITS Services,” Proceedings of the IEEE VTC’99, Amsterdam, 19-29 September 1999, pp. 2223-2227.
|
[3]
|
D. Chaum, “Blind Signatures for Untraceable Payments, Advances in Cryptology,” Proceedings of the Springer-Verlag Crypto’82, Vol. 3, 1983, pp. 199-203.
|
[4]
|
R. Lu, X. Lin, H. Zhu and X. Shen, “SPARK: A New VANET-Based Smart Parking Scheme for Large Parking Lots,” Proceedings of the IEEE INFOCOM’09, Rio de Janeiro, 19-25 April 2009, pp. 1413-1421.
|
[5]
|
T. W. Chim, S. M. Yiu, L. C. K. Hui and V. O. K. Li, “OPQ: OT-Based Private Querying in VANETs,” Transactions on Intelligent Transportation Systems, Vol. 12, No. 4, 2011, pp. 1413-1422.
doi:10.1109/TITS.2011.2158208
|
[6]
|
F. Calabrese, M. Colonna, P. Lovisolo, D. Parata and C. Ratti, “Real-Time Urban Monitoring Using Cell Phones: A Case Study in Rome,” IEEE Transactions on Intelligent Transportation Systems, Vol. 12, No. 1, 2011, pp. 141-151. doi:10.1109/TITS.2010.2074196
|
[7]
|
C. Zhang, R. Lu, X. Lin, P. H. Ho and X. Shen, “An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks,” Proceedings of the IEEE INFOCOM’08, Phoenix, 13-18 April 2008, pp. 816-824.
|
[8]
|
C. Zhang, X. Lin, R. Lu and P. H. Ho, “RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks,” Proceedings of the IEEE ICC’08, Beijing, 19-23 May 2008, pp. 1451-1457.
|
[9]
|
A. Wasef and X. Shen, “PPGCV: Privacy Preserving Group Communications Protocol for Vehicular Ad Hoc Networks,” Proceedings of the IEEE ICC’08, Beijing, 19-23 May 2008, pp. 1458-1463.
|
[10]
|
T. W. Chim, S. M. Yiu, L. C. K. Hui and V. O. K. Li, “SPECS: Secure and Privacy Enhancing Communications for VANET,” Ad Hoc Networks, Vol. 9, No. 2, 2011, pp. 189-203-175.
|
[11]
|
B. K. Chaurasia, S. Verma and S. M. Bhasker, “Message Broadcast in VANETs Using Group Signature,” Proceedings of the IEEE WCSN’09, Allahabad, 27-29 December 2008, pp. 131-136.
|
[12]
|
A. Studer, E. Shi, F. Bai and A. Perrig, “TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs,” Proceedings of the IEEE SECON’09, Rome, 22-26 June 2009, pp. 1-9.
|
[13]
|
L. Chan, S. L. Ng and G. Wang, “Threshold Anonymous Announcement in VANETs,” IEEE Journal on Selected Areas in Communications, Vol. 29, No. 3, 2011, pp. 605-615. doi:10.1109/JSAC.2011.110310
|
[14]
|
D. Chaum, “Security without Identification: Transaction Systems to Make Big Brother Obsolete,” Communications of the ACM, Vol. 28, No. 70, 1985, pp. 1030-1044.
doi:10.1145/4372.4373
|
[15]
|
E. Aimeur, H. Hage and F. S. M. Onana, “Anonymous Credentials for Privacy-Preserving E-learning,” Proceedings of the IEEE MCETECH’08, Washington DC, 23-25 January 2008, pp. 70-80.
|