Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks
Autor Ikram Ali, Yong Chen, Mohammad Faisal, Meng Lien Limba Engleză Paperback – 13 ian 2023
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 915.10 lei 6-8 săpt. | |
Springer Nature Singapore – 13 ian 2023 | 915.10 lei 6-8 săpt. | |
Hardback (1) | 920.94 lei 6-8 săpt. | |
Springer Nature Singapore – 12 ian 2022 | 920.94 lei 6-8 săpt. |
Preț: 915.10 lei
Preț vechi: 1115.97 lei
-18% Nou
Puncte Express: 1373
Preț estimativ în valută:
175.15€ • 182.55$ • 145.80£
175.15€ • 182.55$ • 145.80£
Carte tipărită la comandă
Livrare economică 06-20 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9789811685880
ISBN-10: 9811685886
Pagini: 230
Ilustrații: XIV, 230 p. 57 illus., 44 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.35 kg
Ediția:1st ed. 2022
Editura: Springer Nature Singapore
Colecția Springer
Locul publicării:Singapore, Singapore
ISBN-10: 9811685886
Pagini: 230
Ilustrații: XIV, 230 p. 57 illus., 44 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.35 kg
Ediția:1st ed. 2022
Editura: Springer Nature Singapore
Colecția Springer
Locul publicării:Singapore, Singapore
Cuprins
Introduction.- Preliminaries.- IDC-Based Authentication Scheme using Bilinear Pairings for V2I Communications.- IDC-Based Authentication Scheme using ECC for V2V Communications.- CLC-Based Authentication Scheme using Bilinear Pairings for V2I Communications.- CLC-Based Authentication Scheme using ECC for V2V Communications.- IDC to PKI-Based Hybrid Signcryption Scheme using Bilinear Pairings for Heterogeneous V2I Communications.
Notă biografică
Ikram Ali, he is currently working at the School of Automation Engineering, University of Electronic Science and Technology of China (UESTC) . He received my PhD degree majoring Computer Science and Technology from UESTC in 2020 . Currently, I am working as Post-doctoral researcher and research assistant at the UESTC. His research interest includes Cryptography and Network Security, Security and Privacy of Vehicular Ad-Hoc Networks, Internet of Things Security, Wireless Body Area Networks Security, and Interconnected Vehicular Platoon, Distributed Fault Tolerant Control and Adaptive Control.
Yong Chen (Senior Member, IEEE),he is currently working at the School of Automation Engineering, University of Electronic Science and Technology of China (UESTC) . He received the Ph.D. degree from Chongqing University, Chongqing in 2007, he was a Visiting Scholar with The University of Adelaide during 2013-2014. Since 2015, he has been a Professor and the Ph.D. Supervisorwith the School of Automation Engineering, and the Director of the Institute of Electric Vehicle Driving System and Safety Technology, UESTC. Since 2021, he was also work in the Yangtze Delta Region Institute (Huzhou) ,UESTC. He has published over 100 technical papers in journals and conferences, and over 50 Chinese patents. His current research interests include Networked control system, Cyber physical systems, Fault-tolerant control and reliability and Advanced control.
Mohammad Faisal, He is currently working at the department of computer science and IT, University of Malakand Pakistan, he received his M.S. degree in information security management from SZABIST, Pakistan, in 2012, and the Ph.D. degree in network security from the Department of Computer Science and Information Technology, University of Malakand in 2018. His research interests include ML and security of wireless ad hoc networks MANETs, VANETs, IoT, Cloud, Fog, Edge, Blockchain and digital forensics.
Meng Li is currently working at the School of Automation Engineering, UESTC, he received his Ph.D. degree in control science and engineering from UESTC in 2018. From 2017 to 2018, he was a Joint PhD student with the School of Electrical and Electronic Engineering, The University of Adelaide. Since Jan. 2019, He was a postdoctor with UESTC. He is currently an associate researcher with UESTC. He has published over 20 technical papers in journals and conferences. His research interests include networked control systems, cyberphysical systems and sliding-mode control.
Yong Chen (Senior Member, IEEE),he is currently working at the School of Automation Engineering, University of Electronic Science and Technology of China (UESTC) . He received the Ph.D. degree from Chongqing University, Chongqing in 2007, he was a Visiting Scholar with The University of Adelaide during 2013-2014. Since 2015, he has been a Professor and the Ph.D. Supervisorwith the School of Automation Engineering, and the Director of the Institute of Electric Vehicle Driving System and Safety Technology, UESTC. Since 2021, he was also work in the Yangtze Delta Region Institute (Huzhou) ,UESTC. He has published over 100 technical papers in journals and conferences, and over 50 Chinese patents. His current research interests include Networked control system, Cyber physical systems, Fault-tolerant control and reliability and Advanced control.
Mohammad Faisal, He is currently working at the department of computer science and IT, University of Malakand Pakistan, he received his M.S. degree in information security management from SZABIST, Pakistan, in 2012, and the Ph.D. degree in network security from the Department of Computer Science and Information Technology, University of Malakand in 2018. His research interests include ML and security of wireless ad hoc networks MANETs, VANETs, IoT, Cloud, Fog, Edge, Blockchain and digital forensics.
Meng Li is currently working at the School of Automation Engineering, UESTC, he received his Ph.D. degree in control science and engineering from UESTC in 2018. From 2017 to 2018, he was a Joint PhD student with the School of Electrical and Electronic Engineering, The University of Adelaide. Since Jan. 2019, He was a postdoctor with UESTC. He is currently an associate researcher with UESTC. He has published over 20 technical papers in journals and conferences. His research interests include networked control systems, cyberphysical systems and sliding-mode control.
Textul de pe ultima copertă
This book focuses on the design of secure and efficient signature and signcryption schemes for vehicular ad-hoc networks (VANETs). We use methods such as public key cryptography (PKI), identity-based cryptography (IDC), and certificateless cryptography (CLC) to design bilinear pairing and elliptic curve cryptography-based signature and signcryption schemes and prove their security in the random oracle model. The signature schemes ensure the authenticity of source and integrity of a safety message. While signcryption schemes ensure authentication and confidentiality of the safety message in a single logical step. To provide readers to study the schemes that securely and efficiently process a message and multiple messages in vehicle to vehicle and vehicle to infrastructure communications is the main benefit of this book. In addition, it can benefit researchers, engineers, and graduate students in the fields of security and privacy of VANETs, Internet of vehicles securty, wireless body area networks security, etc.
Caracteristici
Designs secure and efficient signature and signcryption schemes for VANETs Provides security proof in the random oracle model Analyzes the performance in detail in terms of computational and communication/storage cost