|
|
|
|
LEADER |
02858nmm a2200397 u 4500 |
001 |
EB002010543 |
003 |
EBX01000000000000001173442 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
220201 ||| eng |
020 |
|
|
|a 9789811685866
|
100 |
1 |
|
|a Ali, Ikram
|
245 |
0 |
0 |
|a Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks
|h Elektronische Ressource
|c by Ikram Ali, Yong Chen, Mohammad Faisal, Meng Li
|
250 |
|
|
|a 1st ed. 2022
|
260 |
|
|
|a Singapore
|b Springer Nature Singapore
|c 2022, 2022
|
300 |
|
|
|a XIV, 230 p. 57 illus., 44 illus. in color
|b online resource
|
505 |
0 |
|
|a Introduction -- Preliminaries -- IDC-Based Authentication Scheme using Bilinear Pairings for V2I Communications -- IDC-Based Authentication Scheme using ECC for V2V Communications -- CLC-Based Authentication Scheme using Bilinear Pairings for V2I Communications -- CLC-Based Authentication Scheme using ECC for V2V Communications -- IDC to PKI-Based Hybrid Signcryption Scheme using Bilinear Pairings for Heterogeneous V2I Communications
|
653 |
|
|
|a Wireless communication systems
|
653 |
|
|
|a Mobile and Network Security
|
653 |
|
|
|a Computer networks / Security measures
|
653 |
|
|
|a Wireless and Mobile Communication
|
653 |
|
|
|a Mobile communication systems
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Automotive Engineering
|
653 |
|
|
|a Automotive engineering
|
653 |
|
|
|a Data encryption (Computer science)
|
653 |
|
|
|a Cryptology
|
700 |
1 |
|
|a Chen, Yong
|e [author]
|
700 |
1 |
|
|a Faisal, Mohammad
|e [author]
|
700 |
1 |
|
|a Li, Meng
|e [author]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
028 |
5 |
0 |
|a 10.1007/978-981-16-8586-6
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-981-16-8586-6?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 621.384
|
520 |
|
|
|a This book focuses on the design of secure and efficient signature and signcryption schemes for vehicular ad-hoc networks (VANETs). We use methods such as public key cryptography (PKI), identity-based cryptography (IDC), and certificateless cryptography (CLC) to design bilinear pairing and elliptic curve cryptography-based signature and signcryption schemes and prove their security in the random oracle model. The signature schemes ensure the authenticity of source and integrity of a safety message. While signcryption schemes ensure authentication and confidentiality of the safety message in a single logical step. To provide readers to study the schemes that securely and efficiently process a message and multiple messages in vehicle to vehicle and vehicle to infrastructure communications is the main benefit of this book. In addition, it can benefit researchers, engineers, and graduate students in the fields of security and privacy of VANETs, Internet of vehicles securty, wireless body area networks security, etc
|