Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks.
Pandi VijayakumarMaria AzeesVictor I. ChangL. Jegatha DeborahBalamurugan BalusamyPublished in: Clust. Comput. (2017)
Keyphrases
- key distribution
- privacy preserving
- vehicular ad hoc networks
- key management
- routing protocol
- fault tolerant
- ad hoc networks
- privacy preserving data mining
- secret key
- authentication protocol
- data dissemination
- signature scheme
- private information
- wireless sensor networks
- data privacy
- sensitive information
- sensitive data
- multi party
- privacy concerns
- security protocols
- elliptic curve
- wireless ad hoc networks
- fault tolerance
- data sets
- resource constrained
- lightweight
- sensor networks