共 24 条
[2]
Pseudonym Based Mechanism for Sustaining Privacy in VANETs
[J].
2009 1ST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS(CICSYN 2009),
2009,
:420-+
[4]
Hajiahmadi M, 2013, IEEE INT C INTELL TR, P1022, DOI 10.1109/ITSC.2013.6728366
[5]
Efficient identity based signature schemes based on pairings
[J].
SELECTED AREAS IN CRYPTOGRAPHY,
2003, 2595
:310-324
[6]
Khosroshahi A. H., 2011, 2011 IEEE 2nd International Conference on Computing, Control and Industrial Engineering, P9, DOI 10.1109/CCIENG.2011.6007944
[7]
Kirschfink H., 2000, 7 WORLD C INT TRANS
[8]
Lei Zhang, 2011, Information Security. Proceedings 14th International Conference, ISC 2011, P293, DOI 10.1007/978-3-642-24861-0_20
[10]
Liu B., 2014, 6 INT S FDN PRACTICE, V8352, P323