[1] |
JIA D, LU K, WANG J, et al. A Survey on Platoonbased Vehicular Cyber-Physical Systems[J]. IEEE Communications Surveys and Tutorials, 2016,18(1):263-284.
doi: 10.1109/COMST.2015.2410831
|
[2] |
OLARIU S, KHALIL I, ABUELELA M. Taking VANET to the Clouds[J]. International Journal of Pervasive Computing and Communications, 2011,7(1):7-21.
doi: 10.1108/17427371111123577
|
[3] |
LYAMIN N, KLEYKO D, DELOOZ Q, et al. AI-Based Malicious Network Traffic Detection in VANETs[J]. IEEE Network, 2018,32(6):15-21.
|
[4] |
KAASHOEK M F, KARGER D R. Koorde:A Simple Degree-Optimal Distributed Hash Table[C]// Proceedings of the IPTPS 2003:International Workshop on Peer-to-Peer Systems.Heidelberg:Springer, 2003: 98-107.
|
[5] |
AL-RIYAMI S S, PATERSON K G. Certificateless Public Key Cryptography[C/OL]. [2020-12-01]. https://link.springer.com.chapter/10.1007/978-3-540-40061-5_29.
|
[6] |
LIANG W, LI Z, ZHANG H, et al, R.Vehicular Ad Hoc Networks:Architectures,Research Issues,Methodologies,Challenges,and Trends[J]. International Journal of Distributed Sensor Networks, 2015(1):1-11.
|
[7] |
HAMID U Z A, ZAMZURI H, LIMBU D K, Internet of Vehicle (IoV) Applications in Expediting the Implementation of Smart Highway of Autonomous Vehicle:A Survey[M/OL]. [2020-11-28]. https://DOI:10.1007/978-3-319-93557-7_9.
|
[8] |
WU W, YANG Z, LI K. Internet of Vehicles and applications[M/OL]. [2020-11-26]. https://doi.org/10.1016/B978-0-12-805395-9.00016-2.
|
[9] |
PUSTISEK M, KOS A, SEDLAR U. Blockchain Based Autonomous Selection of Electric Vehicle Charging Station[C]// Proceedings of the 2016 International Conference on Identification,Information and Knowledge in the Internet of Things(IIKI).Piscataway:IEEE, 2016: 217-222.
|
[10] |
HUANG X, SUSILO W, MU Y, et al. On the Security of Certificateless Signature Schemes from Asiacrypt 2003[C]// Proceedings of the CANS’05 Proceedings of the 4th International Conference on Cryptology and Network Security.Heidelberg:Springer, 2005: 13-25.
|
[11] |
CHOW S S M, BOYD C, NIETO J M G. Security-Mediated Certificateless Cryptography[C]// Proceedings of the PKC’06 Proceedings of the 9th International Conference on Theory and Practice of Public-Key Cryptography.Heidelberg:Springer, 2006: 508-524.
|
[12] |
BUZACHIS A, CELESTI A, GALLETTA A, et al. A Secure and Dependable Multi-Agent Autonomous Intersection Management (MA-AIM) System Leveraging Blockchain Facilities[C]// Proceedings of the 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion (UCC Companion).Piscataway:IEEE, 2018: 226-231.
|
[13] |
KUZMIN A, ZNAK E. Blockchain-Base Structures for a Secure and Operate Network of Semi-Autonomous Unmanned Aerial Vehicles[C]// Proceedings of the 2018 IEEE International Conference on Service Operations and Logistics,and Informatics(SOLI).Piscataway:IEEE, 2018: 32-37.
|
[14] |
YANG H K, CHA H J, SONG Y J. Secure Identifier Management Based on Blockchain Technology in NDN Environment[J]. IEEE Access, 2019,7:6262-6268.
doi: 10.1109/Access.6287639
|
[15] |
CHEN C M, XIANG B, LIU Y, et al. A Secure Authentication Protocol for Internet of Vehicles[J]. IEEE Access, 2019,7:12047-12057.
doi: 10.1109/Access.6287639
|
[16] |
DUA A, KUMAR N, DAS A K, et al. Secure Message Communication Protocol among Vehicles in Smart City[J]. IEEE Transactions on Vehicular Technology, 2018,67(5):4359-4373.
doi: 10.1109/TVT.2017.2780183
|
[17] |
LI R N, SONG T Y, MEI B, et al. Blockchain For Large-Scale Internet of Things Data Storage and Protection[J]. IEEE Transactions on Services Computing, 2019,12(5):762-771.
doi: 10.1109/TSC.4629386
|
[18] |
CUI H, DENG R H, LAI J, et al. An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures,Revisited[J]. Computer Networks, 2018,133:157-165.
doi: 10.1016/j.comnet.2018.01.034
|