Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, pp.62-73, 1993. ,
DOI : 10.1145/168588.168596
Identity-based key agreement protocols from pairings, International Journal of Information Security, vol.10, issue.4, pp.213-241, 2007. ,
DOI : 10.1007/s10207-006-0011-9
Efficient generic on-line/off-line sinatures without key exposure, ANCS LNCS, vol.4521, pp.18-30, 2007. ,
Location-Aware Services over Vehicular Ad-Hoc Networks using Car-to-Car Communication, IEEE Journal on Selected Areas in Communications, vol.25, issue.8, pp.1590-1602, 2007. ,
DOI : 10.1109/JSAC.2007.071008
VITP, Proceedings of the 2nd ACM international workshop on Vehicular ad hoc networks , VANET '05, pp.30-39, 2005. ,
DOI : 10.1145/1080754.1080759
A Schnorr-Like Lightweight Identity-Based Signature Scheme, Africacrypt 2009, pp.135-148, 2009. ,
DOI : 10.1007/3-540-39568-7_5
Identity-Based Aggregate Signatures, Public Key Cryptography -PKC 2006, pp.257-273, 2006. ,
DOI : 10.1007/11745853_17
Greedy perimeter stateless routing for wireless networks, 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp.243-254, 2000. ,
DOI : 10.21236/ADA440078
Hierarchical location service for mobile ad-hoc networks, ACM SIGMOBILE Mobile Computing and Communications Review, vol.8, issue.4, pp.47-58, 2004. ,
DOI : 10.1145/1052871.1052875
Chameleon signatures, Symposium on Network and Distributed Systems Security (NDSS 2000), pp.143-154, 2000. ,
POSITION VERIFICATION APPROACHES FOR VEHICULAR AD HOC NETWORKS, IEEE Wireless Communications, vol.13, issue.5, pp.16-21, 2006. ,
DOI : 10.1109/WC-M.2006.250353
GSIS: A secure and privacy preserving protocol for vehicular communications, IEEE Transactions on Vehicular Technology, vol.56, issue.6, pp.3442-3456, 2007. ,
ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications, IEEE INFOCOM 2008, The 27th Conference on Computer Communications, pp.1229-1237, 2008. ,
DOI : 10.1109/INFOCOM.2008.179
TrafficView, ACM SIGMOBILE Mobile Computing and Communications Review, vol.8, issue.3, pp.6-19, 2004. ,
DOI : 10.1145/1031483.1031487
An efficient anonymous authentication protocol for secure vehicular communications, Journal of Information Science and Engineering, vol.26, issue.3, pp.785-800, 2010. ,
Securing location aware services over VANET using geographical secure path routing, 2008 IEEE International Conference on Vehicular Electronics and Safety, pp.346-353, 2008. ,
DOI : 10.1109/ICVES.2008.4640905
Securing vehicular ad hoc networks, Journal of Computer Security, vol.15, issue.1, pp.39-68, 2007. ,
DOI : 10.3233/JCS-2007-15103
Location Verification for VANETs Routing, 2009 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp.141-146, 2009. ,
DOI : 10.1109/WiMob.2009.33
Efficient and provably secure identity based aggregate signature schemes with partial and full aggregation, Cryptography ePrint Archive, 2010. ,
Improved online/offline signature schemes Advances in Cryptology -Crypto Available, 21. Dedicated Short Range Communications (DSRC), pp.355-367, 2001. ,