Design of secure protocol for session key exchange in vehicular cloud computing

被引:0
|
作者
Kang, Jungho [1 ]
Park, Jong Hyuk [2 ]
机构
[1] Department of Computing, Soongsil University, 402 Information Science Building, 369 Sangdo-Ro, Dongjak-Gu,Seoul,156-743, Korea, Republic of
[2] Department of Computer Science and Engineering, Seoul National University of Science and Technology, Gongneung 2-dong, Nowon-Gu,Seoul,139-743, Korea, Republic of
来源
关键词
D O I
10.1007/978-981-10-0281-6_36
中图分类号
学科分类号
摘要
引用
收藏
页码:249 / 254
相关论文
共 50 条
  • [41] Reasoning about a Communication Protocol for Vehicular Cloud Computing Systems
    Ghazizadeh, Aida
    Ghazizadeh, Puya
    Olariu, Stephan
    2019 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2019, : 214 - 219
  • [42] Secure Channel Establishment Scheme for Task Delivery in Vehicular Cloud Computing
    Zhang, Rui
    Zhang, Lei
    Wu, Qian
    Zhou, Jianying
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 2865 - 2880
  • [43] A secure authenticated and key exchange scheme for fog computing
    Chen, Chien-Ming
    Huang, Yanyu
    Wang, King-Hang
    Kumari, Saru
    Wu, Mu-En
    ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (09) : 1200 - 1215
  • [44] Secure and Privacy Preserving Protocol for Cloud-Based Vehicular DTNs
    Zhou, Jun
    Dong, Xiaolei
    Cao, Zhenfu
    Vasilakos, Athanasios V.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (06) : 1299 - 1314
  • [45] Analysis and Design of Functional Device for Vehicular Cloud Computing
    Wu, Guilu
    Li, Sha
    Wang, Shujun
    Jiang, Yutong
    Li, Zhengquan
    ELECTRONICS, 2019, 8 (05):
  • [46] Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key
    Kim, Mijin
    Jo, Heasuk
    Kim, Seungjoo
    Won, Dongho
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2009, PT II, 2009, 5593 : 204 - 211
  • [47] HKE-BC: hierarchical key exchange for secure scheduling and auditing of big data in cloud computing
    Liu, Chang
    Beaugeard, Nick
    Yang, Chi
    Zhang, Xuyun
    Chen, Jinjun
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (03): : 646 - 660
  • [48] Design of a Trusted Third Party Key Exchange Protocol for Secure Internet of Things (IoT)
    Jamshiya, P. K.
    Menon, Divya M.
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1834 - 1838
  • [49] Strongly Secure Key Exchange Protocol with Minimal KEM
    Tian, Baoping
    Wei, Fushan
    Ma, Chuangui
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015, 2015, 9065 : 139 - 153
  • [50] Secure Authenticated Key Exchange Protocol for Credential Services
    Balakrishna, R.
    Rao, U. Rajeswara
    Geethanjali, N.
    DESIDOC JOURNAL OF LIBRARY & INFORMATION TECHNOLOGY, 2009, 29 (03): : 49 - 54