Design of secure protocol for session key exchange in vehicular cloud computing

被引:0
|
作者
Kang, Jungho [1 ]
Park, Jong Hyuk [2 ]
机构
[1] Department of Computing, Soongsil University, 402 Information Science Building, 369 Sangdo-Ro, Dongjak-Gu,Seoul,156-743, Korea, Republic of
[2] Department of Computer Science and Engineering, Seoul National University of Science and Technology, Gongneung 2-dong, Nowon-Gu,Seoul,139-743, Korea, Republic of
来源
关键词
D O I
10.1007/978-981-10-0281-6_36
中图分类号
学科分类号
摘要
引用
收藏
页码:249 / 254
相关论文
共 50 条
  • [31] Design of Efficient Algorithm for Secured Key Exchange over Cloud Computing
    Gadhavi, Lata
    Bhavsar, Madhuri
    Bhatnagar, Monica
    Vasoya, Shivani
    2016 6TH INTERNATIONAL CONFERENCE - CLOUD SYSTEM AND BIG DATA ENGINEERING (CONFLUENCE), 2016, : 180 - 187
  • [32] Blockchain-assisted full-session key agreement for secure data sharing in cloud computing
    Long, Yangyang
    Peng, Changgen
    Tan, Weijie
    Chen, Yuling
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2024, 193
  • [33] Secure Communication Protocol for Smart Transportation Based on Vehicular Cloud
    Limbasiya, Trupil
    Das, Debasis
    Sahay, Sanjay K.
    UBICOMP/ISWC'19 ADJUNCT: PROCEEDINGS OF THE 2019 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING AND PROCEEDINGS OF THE 2019 ACM INTERNATIONAL SYMPOSIUM ON WEARABLE COMPUTERS, 2019, : 372 - 376
  • [34] Design Flaws in a Secure Medical Data Exchange Protocol Based on Cloud Environments
    Li, Chun-Ta
    Lee, Cheng-Chi
    Wang, Chun-Cheng
    Yang, Tzu-Hui
    Chen, Song-Jhih
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 435 - 444
  • [35] A Provably Secure Authenticated Key Exchange Protocol
    Zhang, Lijiang
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 292 - 297
  • [36] An Iterative Hierarchical Key Exchange Scheme for Secure Scheduling of Big Data Applications in Cloud Computing
    Liu, Chang
    Zhang, Xuyun
    Liu, Chengfei
    Yang, Yun
    Ranjan, Rajiv
    Georgakopoulos, Dimitrios
    Chen, Jinjun
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 9 - 16
  • [37] A novel secure authentication protocol for eHealth records in cloud with a new key generation method and minimized key exchange
    Singh, B. Mohinder
    Natarajan, Jaisankar
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (07)
  • [38] ANALYSIS AND DESIGN OF AN OPTIMIZED SECURE AUDITING PROTOCOL FOR STORING DATA DYNAMICALLY IN CLOUD COMPUTING
    Kumar, Raman
    Singh, Gurpreet
    MATERIALS TODAY-PROCEEDINGS, 2018, 5 (01) : 1037 - 1047
  • [39] Integrated Authentication and Key Agreement Framework for Vehicular Cloud Computing
    Jiang, Qi
    Ni, Jianbing
    Ma, Jianfeng
    Yang, Li
    Shen, Xuemin
    IEEE NETWORK, 2018, 32 (03): : 28 - 35
  • [40] Dyanimc Key based Authentication Scheme for Vehicular Cloud Computing
    Sharma, Manish Kumar
    Bali, Rasmeet S.
    Kaur, Arvinder
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1059 - 1064