[1] Chenxi Zhang, Xiaodong Lin, Rongxing Lu, Pin-Han
Ho and Xuemin (Sherman) Shen, “An Efficient
Message Authentication Scheme for Vehicular
Communication”, in IEEE Transactions on Vehicular
Technology, vol. 57, No. 6, November 2008.
[2] S. Lee, G. Pan, J. Park, M. Gerla, and S. Lu, “Secure
incentives for commercial ad dissemination in
vehicular networks,” in Proc. ACM Int. Symp.
MobiHoc, 2007, pp. 150–159.
[3] H. Oh, C. Yae, D. Ahn, and H. Cho, “5.8 GHz DSRC
Packet Communication System for ITS Services,” in
Proceedings of the IEEE VTC ’99, Sept. 1999, pp.
2223 – 2227.
[4] F. Sabahi, "Vehicular Ad-hoc Networks Security
Analysis," Presented at International Conf. on
Computer Engineering and Applications (ICCEA),
2011.
[5] Khaleel Mershad and Hassan Artail, “A Framework
for Secure and Efficient Data Acquisition in Vehicular
Ad Hoc Networks”, IEEE Transactions On Vehicular
Technology, Vol. 62, No. 2, February 2013.
[6] S. Zeadally, R. Hunt, Y. S. Chen, A. Irwin, and A.
Hassan, “Vehicular Ad Hoc Networks (VANETS):
Status, Results, and Challenges”, 2010.
[7] Farzad Sabahi, “The Security of Vehicular Adhoc
Networks”, Third International Conference on
Computational Intelligence, Communication Systems
and Networks, 2011, IEEE Computer Society 978-0-
7695-4482-3/11.
[8] Mondal, Bilkish. "Measurement of Fluidic Sensitivity
of Fluidic Sensor." Cresol 1: 1024. ijcat.org, pg 205-
209.
[9] Ghassan Samara, Wafaa A.H. Ali Alsalihy, “A New
Security Mechanism for Vehicular Communication
Networks”, 2012 IEEE 978-1-4673-1677-4
[10] Milos Borenovic, Aleksandar Neskovic, and Natasa
Neskovic, “Vehicle Positioning Using GSM and
Cascade-Connected ANN Structures”, Ieee
Transactions On Intelligent Transportation Systems,
Vol. 14, No. 1, March 2013
[11] M. Raya, P. Papadimitratos, J. Hubaux, “ Securing
Vehicular Communication”, IEEE Wireless
Communication,2006, Vol.13, No.5, pp.8-15.
[12] Ghassan Samara, Wafaa A.H. Al-Salihy, R.
Sures,“Security Analysis of Vehicular Ad Hoc
Networks (VANET)”, Second International Conference
on Network Applications, Protocols and Services, 2010
IEEE 978-0-7695-4177-8/10
[13] Ren-Junn Hwang, Yu-Kai Hsiao, Yen-Fu Liu, “Secure
Communication Scheme of VANET with Privacy
Preserving”, IEEE 17th International Conference on
Parallel and Distributed Systems, 2011
[14] X. Lin, K. Lu, C. Zhang, P. Ho, X. Shen, “Security in
Ad-hoc Wireless Networks”, IEEE Communication
Magazine,2008, Vol.46,No.4,pp-88-95.
[15] G. Calandriello, P. Papadimitratos, J.-P. Hubaux and A.
Lioy, “Efficient and robust pseudonymous
authentication in VANET,” Proceedings of the fourth
ACM international workshop on Vehicular ad hoc
networks, pp. 19-28, 2007.
[16] C. Lai, H. Chang, C.- C. Lu, “A secure anonymous key
mechanism for privacy protection in VANET,”
Conference on Intelligent Transport Systems
Telecommunications, pp. 635-640, 2009.
[17] Thejaswi, D. T. "MART: Multipath-Based Anonymous
Routing Protocol in MANETs." ijcat.org, pg 173-178.
[18] X. Lin, X. Sun, P.H.Ho, X. Shen, “ GSIS: A Secure &
privacy preserving protocol for vehicular
communications”, IEEE Transactions on Vehicular
Technology, Vol-56, No.6, pp.3442-3456.
[19] P. Kamat, A. Baliga, W. Trappe, “ An Identity based
security framework for VANETs”, Procee.dings of 3rd
International Workshop on Vehicular Ad-Hoc
Networks, pp.94-95.
[20] Nurain Izzati Shuhaimi, Tutun Zuhana, “Security in
Vehicular Ad-Hoc Network with Identity-Based
Cryptography Approach: A Survey”, 7th International
Conference on Telecommunication Systems, Services,
and Applications (TSSA), 2012, IEEE 978-1-4673-
4550-7/12.
[21] R. Peplow, D.S. Dawoud, and J. van der Merwe,
“Ensuring privacy in vehicular communication,” in
Proceedings of the 1st International Conference on
Wireless Communication, Vehicular Technology,
Information Theory and Aerospace & Electronic
Systems Technology, pp. 610-614, 2009.
[22] D. Hakerson, A. Menezes, and S. Vanston , “Guide to
Elliptic Curve Cryptography,” Springer-Verlag, NY
(2004).
[23] V.S. Miller, “uses of elliptic curves in cryptography,”
in Advances in Cryptology, CRYPTO’85, ser . Lecture
Notes in Computer Science, vol. 218, Springer, 1986.
pp. 417-428.