|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBSCO_on1089930718 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
190315s2018 xx o 000 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d EBLCP
|d N$T
|d OCLCF
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
020 |
|
|
|a 9783960676805
|q (electronic bk.)
|
020 |
|
|
|a 3960676808
|q (electronic bk.)
|
020 |
|
|
|z 9783960671800
|
035 |
|
|
|a (OCoLC)1089930718
|
050 |
|
4 |
|a TE228.37
|
072 |
|
7 |
|a COM
|x 013000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 014000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 018000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 067000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 032000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 037000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 052000
|2 bisacsh
|
082 |
0 |
4 |
|a 004.6
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Maria, Azees,
|e author.
|
245 |
1 |
0 |
|a Efficient Anonymous Authentication and Key Management Techniques for Vehicular Ad-hoc Networks /
|c Azees Maria.
|
264 |
|
1 |
|a [Place of publication not identified] :
|b Diplomica Verlag GmbH :
|b Anchor Academic Publishing,
|c 2018.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from PDF title page (EBSCO, viewed April 2, 2019).
|
505 |
0 |
|
|a Efficient Anonymous Authentication and Key Management Techniques for Vehicular Ad-hoc Networks; ABSTRACT; ACKNOWLEGDEMENT; TABLE OF CONTENTS; LIST OF TABLES; LIST OF FIGURES; LIST OF SYMBOLS AND ABBREVIATIONS; CHAPTER 1 INTRODUCTION; 1.1 VANET OVERVIEW; 1.1.1 VANET System Model; 1.1.2 Dedicated Short Range Communication (DSRC); 1.1.3 VANET Characteristics; 1.2 SECURITY ISSUES IN VANET; 1.3 PROPOSED WORKS; 1.4 OBJECTIVES OF THE RESEARCH WORK; 1.5 ASSUMPTIONS; 1.6 ORGANIZATION OF THE THESIS; CHAPTER 2 LITERATURE SURVEY; 2.1 INTRODUCTION; 2.2 SECURITY SERVICES OF VANETS
|
505 |
8 |
|
|a 2.3 AVAILABILITY IN VANETS2.3.1 Threats and Attacks on Availability; 2.3.2 Works on Availability; 2.4 CONFIDENTIALITY IN VANETS; 2.4.1 Threats and Attacks on Confidentiality; 2.4.2 Works on Confidentiality; 2.5 AUTHENTICATION IN VANETS; 2.5.1 Threats and Attacks on Authentication; 2.5.2 Requirements for Authentication; 2.5.3 Works on Authentication with Privacy Preservation; 2.5.4 Computational Cost for Various Authentication Schemes; 2.6 DATA INTEGRITY IN VANETS; 2.6.1 Threats and Attacks on Data Integrity; 2.6.2 Works on Data Integrity; 2.7 NON-REPUDIATION IN VANETS
|
505 |
8 |
|
|a 2.7.1 Attack on Non-repudiation2.7.2 Works on Non-repudiation; 2.8 COUNTERMEASURES ON VARIOUS SECURITYATTACKS; 2.9 WORKS ON KEY MANAGEMENT; 2.10 LITERATURE SURVEY GAPS; 2.11 PROPOSED WORK; 2.12 CONCLUSIONS; CHAPTER3 SYSTEM ARCHITECTURE; CHAPTER 4 DUAL AUTHENTICATION AND DUAL KEYMANAGEMENT FOR GROUP COMMUNICATION; 4.1 INTRODUCTION; 4.2 PROPOSED DUAL AUTHENTICATION TECHNIQUE; 4.2.1 Registration Through Offline Mode; 4.2.2 Vehicle's Authentication Process; 4.2.3 Trusted Authority's Authentication Process and the Provisionof Authentication Code (AC)
|
505 |
8 |
|
|a 4.3 PROPOSED DUAL KEY MANAGEMENT FOR GROUPCOMMUNICATION4.3.1 TA Initial Set Up; 4.3.2 Group Key Computation; 4.3.3 Secure Data Transmission in VANETs; 4.3.4 Key Updating; 4.4 SECURITY ANALYSIS; 4.4.1 Resistance to Replay Attack; 4.4.2 Masquerade and Sybil Attacks; 4.4.3 Message Tampering /Fabrication/Alteration Attack; 4.4.4 Backward Secrecy; 4.4.5 Forward Secrecy; 4.4.6 Collusion Attack; 4.5 PERFORMANCE ANALYSIS; 4.6 CONCLUSIONS; CHAPTER 5 CPAV: COMPUTATIONALLY EFFICIENT PRIVACY PRESERVING ANONYMOUS AUTHENTICATION FOR A VEHICLE USER IN VANETS; 5.1 INTRODUCTION; 5.2 SECURITY REQUIREMENTS
|
505 |
8 |
|
|a 5.3 BILINEAR PAIRING5.4 PROPOSED CPAV SCHEME; 5.4.1 System Initialization; 5.4.2 Registration; 5.4.3 Secure Activation Key Distribution; 5.4.4 CPAV Secure Anonymous Mutual Authentication; 5.5 SECURITY ANALYSIS; 5.5.1 Message Integrity and Source Authentication; 5.5.2 Conditional Privacy Preservation; 5.5.3 Anonymity; 5.6 PERFORMANCE ANALYSIS; 5.7 CONCLUSIONS; CHAPTER 6 EFFICIENT ANONYMOUS AUTHENTICATION OF AN RSU; 6.1 INTRODUCTION; 6.2 ANONYMOUS AUTHENTICATION; 6.2.1 System Initialization; 6.2.2 Anonymous Authentication of an RSU; 6.3 SECURITY ANALYSIS; 6.4 PERFORMANCE ANALYSIS
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Vehicular ad hoc networks (Computer networks)
|
650 |
|
0 |
|a Traffic congestion.
|
650 |
|
0 |
|a Intelligent transportation systems.
|
650 |
|
6 |
|a Réseaux ad hoc de véhicules.
|
650 |
|
6 |
|a Embouteillages (Circulation)
|
650 |
|
6 |
|a Systèmes de transport intelligents.
|
650 |
|
7 |
|a COMPUTERS
|x Computer Literacy.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Computer Science.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Data Processing.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Hardware
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Information Technology.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Machine Theory.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Reference.
|2 bisacsh
|
650 |
|
7 |
|a Intelligent transportation systems
|2 fast
|
650 |
|
7 |
|a Traffic congestion
|2 fast
|
650 |
|
7 |
|a Vehicular ad hoc networks (Computer networks)
|2 fast
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2070390
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5735882
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2070390
|
994 |
|
|
|a 92
|b IZTAP
|