|
[1] Englund C., Chen L., Vinel A., Lin S.Y. (2015) Future Applications of VANETs. In: Campolo C., Molinaro A., Scopigno R. (eds) Vehicular ad hoc Networks. Springer, [2] "內政部統計網-道路交通事故" https://stat.motc.gov.tw/mocdb/stmain.jsp?sys=100&funid=b3303 [3] 曾平毅, 許志誠, 王慧平, "偵辨交通肇事逃逸案件重要課題剖析", 道路交通安全死與執法研討會, Sep, 2016 [4] Official journal of the European Union, vol. 47, no. 2, pp. 6-15 [5] M. Gerlach, "Assessing and improving privacy in VANETs," in Proc. 4th Workshop ESCAR, Nov. 2006, pp. 1–9. [6] B. Wiedersheim, Z. Ma, F. Kargl, and P. Papadimitratos, "Privacy in inter-vehicular networks: Why simple pseudonym change is not enough," in Proc. 7th Int. Conf. WONS, Feb. 2010, pp. 176–183. [7] D. Chaum and E. van Heyst, Group Signatures, in EUROCRYPT 1991, vol. 547 of LNCS, Springer, 1991, pp. 257–265. 21, 30, 31, 32, 101 [8] "Bitcoin: A Peer-to-Peer Electronic Cash System ", https://bitcoin.org/bitcoin.pdf [9] "bip-0032", https://github.com/bitcoin/bips/blob/master/bip-0032.mediawiki [10] "bip-0039", https://github.com/bitcoin/bips/blob/master/bip-0039.mediawiki [11] "bip-0044", https://github.com/bitcoin/bips/blob/master/bip-0044.mediawiki [12] D. Eckhoff, C. Sommer, T. Gansen, R. German, and F. Dressler, “Strong and affordable location privacy in VANETs: Identity diffusion using time-slots and swapping,” in Proc. 2nd IEEE VNC, Dec. 2010, pp. 174–181 [13] J. Freudiger, M. H. Manshaei, J.-P. Hubaux, and D. C. Parkes, "Non-Cooperative Location Privacy," IEEE Trans. Dependable Secure Comp., vol. 10, no. 2, pp. 84–98, Mar./Apr. 2013. [14] H. Lu, J. Li, and M. Guizani, "A novel ID-based authentication framework with adaptive privacy preservation for VANETs," in Proc. Comput., Commun. Appl. Conf. (ComComAp), Jan. 2012, pp. 345–350. [15] L. Zhang, C. Hu, Q. Wu, J. Domingo-Ferrer and B. Qin, "Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response," in IEEE Transactions on Computers, vol. 65, no. 8, pp. 2562-2574, 1 Aug. 2016, [16] L. Zhang, Q. Wu, J. Domingo-Ferrer, B. Qin, and C. Hu, "Distributed aggregate privacy-preserving authentication in VANETs," IEEE Trans. Intell. Transp. Syst., vol. 18, no. 3, pp. 516–526, Mar. 2017. [17] G. Calandriello, P. Papadimitratos, J.-P. Hubaux, and A. Lioy, "Efficient and robust pseudonymous authentication in VANET," in Proc. 4th ACM Int. workshop VANET, Sep. 2007, pp. 19–28. [18] X. Lin, X. Sun, P.-H. Ho, and X. Shen, "GSIS: A secure and privacy preserving protocol for vehicular communications," IEEE Trans. Veh. Technol., vol. 56, no. 6, pp. 3442–3456, Nov. 2007. [19] Hui Liu, Hui Li, Zhanxin Ma, "Efficient and Secure Authentication Protocol for VANET", 2010 International Conference on Computational Intelligence and Security [20] K. Lim, K. M. Tuladhar, X. Wang and W. Liu, "A scalable and secure key distribution scheme for group signature based authentication in VANET," 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), New York, NY, 2017, pp. 478-483, [21] J. Shao, X. Lin, R. Lu and C. Zuo, "A Threshold Anonymous Authentication Protocol for VANETs," in IEEE Transactions on Vehicular Technology, vol. 65, no. 3, pp. 1711-1720, March 2016, [22] R. Yu, J. Kang, X. Huang, S. Xie, Y. Zhang and S. Gjessing, "MixGroup: Accumulative Pseudonym Exchanging for Location Privacy Enhancement in Vehicular Social Networks," in IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 1, pp. 93-105, 1 Jan.-Feb. 2016, [23] Y. Xi, K. Sha, W. Shi, L. Schwiebert and T. Zhang, "Enforcing Privacy Using Symmetric Random Key-Set in Vehicular Networks," Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07), Sedona, AZ, 2007, pp. 344-351, [24] P. Vijayakumar, M. Azees, A. Kannan, and L. J. Deborah, "Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks," IEEE Trans. Intell. Transp. Syst., vol. 17, no. 4, pp. 1015–1028, Apr. 2016 [25] J. Freudiger, M. H. Manshaei, J. Hubaux and D. C. Parkes, "Non-Cooperative Location Privacy," in IEEE Transactions on Dependable and Secure Computing, vol. 10, no. 2, pp. 84-98, March-April 2013, [26] A. Boualouache and S. Moussaoui, "S2SI: A Practical Pseudonym Changing Strategy for Location Privacy in VANETs," 2014 International Conference on Advanced Networking Distributed Systems and Applications, Bejaia, 2014, pp. 70-75, [27] B. Ying, D. Makrakis and Z. Hou, "Motivation for Protecting Selfish Vehicles' Location Privacy in Vehicular Networks," in IEEE Transactions on Vehicular Technology, vol. 64, no. 12, pp. 5631-5641, Dec. 2015 [28] Abdelwahab Boualouache, Sidi-Mohammed Senouci, Samira Moussaoui, "VLPZ: The Vehicular Location Privacy Zone," Procedia Computer Science, Volume 83, 2016, Pages 369-376, ISSN 1877-0509, [29] Martínez V.G., Encinas L.H., Song SZ. (2015) Group Signatures in Practice. In: Herrero Á., Baruque B., Sedano J., Quintián H., Corchado E. (eds) International Joint Conference. CISIS 2015. Advances in Intelligent Systems and Computing, vol 369. Springer, [30] "Dr.Speed provide by Chungwa Telecom", http://speed.hinet.net/ [31] "交通部高速公路局", https://www.freeway.gov.tw/ |