LEADER 03885nam 22007095 450 001 9910743388903321 005 20251113205449.0 010 $a981-16-8585-1 010 $a981-16-8586-X 010 $a981-16-8586-X 024 7 $a10.1007/978-981-16-8586-6 035 $a(MiAaPQ)EBC6852320 035 $a(Au-PeEL)EBL6852320 035 $a(CKB)20667637000041 035 $a(OCoLC)1292354139 035 $a(DE-He213)978-981-16-8586-6 035 $a(EXLCZ)9920667637000041 100 $a20220111d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aEfficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks /$fby Ikram Ali, Yong Chen, Mohammad Faisal, Meng Li 205 $a1st ed. 2022. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2022. 215 $a1 online resource (237 pages) 225 1 $aEngineering Series 311 08$aPrint version: Ali, Ikram Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks Singapore : Springer Singapore Pte. Limited,c2022 9789811685859 320 $aIncludes bibliographical references. 327 $aIntroduction -- Preliminaries -- IDC-Based Authentication Scheme using Bilinear Pairings for V2I Communications -- IDC-Based Authentication Scheme using ECC for V2V Communications -- CLC-Based Authentication Scheme using Bilinear Pairings for V2I Communications -- CLC-Based Authentication Scheme using ECC for V2V Communications -- IDC to PKI-Based Hybrid Signcryption Scheme using Bilinear Pairings for Heterogeneous V2I Communications. 330 $aThis book focuses on the design of secure and efficient signature and signcryption schemes for vehicular ad-hoc networks (VANETs). We use methods such as public key cryptography (PKI), identity-based cryptography (IDC), and certificateless cryptography (CLC) to design bilinear pairing and elliptic curve cryptography-based signature and signcryption schemes and prove their security in the random oracle model. The signature schemes ensure the authenticity of source and integrity of a safety message. While signcryption schemes ensure authentication and confidentiality of the safety message in a single logical step. To provide readers to study the schemes that securely and efficiently process a message and multiple messages in vehicle to vehicle and vehicle to infrastructure communications is the main benefit of this book. In addition, it can benefit researchers, engineers, and graduate students in the fields of security and privacy of VANETs, Internet of vehicles securty, wireless body area networks security, etc. 410 0$aEngineering Series 606 $aWireless communication systems 606 $aMobile communication systems 606 $aComputer networks$xSecurity measures 606 $aCryptography 606 $aData encryption (Computer science) 606 $aAutomotive engineering 606 $aWireless and Mobile Communication 606 $aMobile and Network Security 606 $aCryptology 606 $aAutomotive Engineering 615 0$aWireless communication systems. 615 0$aMobile communication systems. 615 0$aComputer networks$xSecurity measures. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aAutomotive engineering. 615 14$aWireless and Mobile Communication. 615 24$aMobile and Network Security. 615 24$aCryptology. 615 24$aAutomotive Engineering. 676 $a629.272 700 $a?Ali?$b Ikra?m$01077627 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910743388903321 996 $aEfficient and provably secure schemes for vehicular ad-hoc networks$93560775 997 $aUNINA