001443710 000__ 03648cam\a2200553\a\4500 001443710 001__ 1443710 001443710 003__ OCoLC 001443710 005__ 20230310003558.0 001443710 006__ m\\\\\o\\d\\\\\\\\ 001443710 007__ cr\un\nnnunnun 001443710 008__ 220115s2022\\\\si\\\\\\ob\\\\000\0\eng\d 001443710 019__ $$a1292033578$$a1292063412$$a1292144833$$a1292349383$$a1292426462$$a1294356460$$a1296666809 001443710 020__ $$a9789811685866$$q(electronic bk.) 001443710 020__ $$a981168586X$$q(electronic bk.) 001443710 020__ $$z9811685851 001443710 020__ $$z9789811685859 001443710 0247_ $$a10.1007/978-981-16-8586-6$$2doi 001443710 035__ $$aSP(OCoLC)1292354139 001443710 040__ $$aEBLCP$$beng$$epn$$cEBLCP$$dYDX$$dGW5XE$$dDCT$$dEBLCP$$dDKU$$dOCLCO$$dINU$$dOCLCO$$dOCLCQ$$dUKAHL$$dOCLCQ 001443710 049__ $$aISEA 001443710 050_4 $$aTE228.37 001443710 08204 $$a629.2/72$$223 001443710 1001_ $$aAli, Ikram,$$dactive 2022- 001443710 24510 $$aEfficient and provably secure schemes for vehicular ad-hoc networks /$$cIkram Ali, Yong Chen, Mohammad Faisal, Meng Li. 001443710 260__ $$aSingapore :$$bSpringer,$$c2022. 001443710 300__ $$a1 online resource (237 pages) 001443710 336__ $$atext$$btxt$$2rdacontent 001443710 337__ $$acomputer$$bc$$2rdamedia 001443710 338__ $$aonline resource$$bcr$$2rdacarrier 001443710 347__ $$atext file 001443710 347__ $$bPDF 001443710 504__ $$aIncludes bibliographical references. 001443710 5050_ $$aIntroduction -- Preliminaries -- IDC-Based Authentication Scheme using Bilinear Pairings for V2I Communications -- IDC-Based Authentication Scheme using ECC for V2V Communications -- CLC-Based Authentication Scheme using Bilinear Pairings for V2I Communications -- CLC-Based Authentication Scheme using ECC for V2V Communications -- IDC to PKI-Based Hybrid Signcryption Scheme using Bilinear Pairings for Heterogeneous V2I Communications. 001443710 506__ $$aAccess limited to authorized users. 001443710 520__ $$aThis book focuses on the design of secure and efficient signature and signcryption schemes for vehicular ad-hoc networks (VANETs). We use methods such as public key cryptography (PKI), identity-based cryptography (IDC), and certificateless cryptography (CLC) to design bilinear pairing and elliptic curve cryptography-based signature and signcryption schemes and prove their security in the random oracle model. The signature schemes ensure the authenticity of source and integrity of a safety message. While signcryption schemes ensure authentication and confidentiality of the safety message in a single logical step. To provide readers to study the schemes that securely and efficiently process a message and multiple messages in vehicle to vehicle and vehicle to infrastructure communications is the main benefit of this book. In addition, it can benefit researchers, engineers, and graduate students in the fields of security and privacy of VANETs, Internet of vehicles securty, wireless body area networks security, etc. 001443710 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed February 2, 2022). 001443710 650_0 $$aVehicular ad hoc networks (Computer networks)$$xSecurity measures. 001443710 650_6 $$aRéseaux ad hoc de véhicules$$xSécurité$$xMesures. 001443710 655_0 $$aElectronic books. 001443710 7001_ $$aChen, Yong$$c(Automobile engineer) 001443710 7001_ $$aFaisal, Mohammad$$c(Of Malākanḍ Pohantūn) 001443710 7001_ $$aLi, Meng,$$dactive 2022- 001443710 77608 $$iPrint version:$$aAli, Ikram.$$tEfficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks.$$dSingapore : Springer Singapore Pte. Limited, ©2022$$z9789811685859 001443710 852__ $$bebk 001443710 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-981-16-8586-6$$zOnline Access$$91397441.1 001443710 909CO $$ooai:library.usi.edu:1443710$$pGLOBAL_SET 001443710 980__ $$aBIB 001443710 980__ $$aEBOOK 001443710 982__ $$aEbook 001443710 983__ $$aOnline 001443710 994__ $$a92$$bISE