Menu
Home
Log in / Register
 
Home arrow Engineering arrow Verifiable Privacy Protection for Vehicular Communication Systems

Verifiable Privacy Protection for Vehicular Communication Systems


Key results and publicationsEvaluation of pseudonym change strategiesA pseudonym system with strong privacy guaranteesDecentralized enforcement of location privacyScope and limitationsStructure of this workBackgroundVehicular communicationMotivation and use casesResearch, standardization and deploymentPrivacyLocation privacyLocation privacy metricsVerifiable privacy protectionSecurity and privacy in vehicular communicationSecurity and privacy requirementsSecurity research projectsPseudonymous authenticationTracking attacksNotationEvaluation of Pseudonym StrategiesMotivationRelated workSystem model and scenarioRequirementsRequirements for pseudonym strategiesAttacker modelBuilding blocksMix-zonesMatching in bipartite graphsEvaluation frameworkFramework implementationModel mobilityApply pseudonym strategyObserve vehiclesLearn & attackEvaluationSummaryA Pseudonym System with Strong Privacy GuaranteesMotivationRelated workSystem model and scenarioRequirementsAttacker modelBuilding blocksThe basic pseudonym schemeZero-knowledge proofs of knowledgeDynamic accumulatorsBlind signaturesCL signaturesPeriodic n-show credentialsTrusted componentsPUCA — Pseudonyms with user-controlled anonymityProtocolsExtensions and modificationsAlternative realization using Brands credentialsAlternative realization using Lian et al.’s credential schemeIntegration into existing systemsREWIRE — Revocation without resolutionR-Tokens for self-identificationProtocols and message formatsTrusted computing integrationPrevent blocking of OSR messagesEvaluationSecurity and privacy analysisPerformance evaluationSummaryDecentralized Enforcement of k-Anonymity for Location Privacy Using Secret SharingMotivationRelated workSystem model and scenarioRequirementsAttacker modelBuilding blocksK-anonymityShamir’s secret sharingDecentralized, non-interactive secret sharingPrivacy-friendly traffic analysisLocation obfuscationLocation- and time-specific keysKey exchange modesProtocolsEvaluationSecurity and privacy analysisSimulation setupAvailability of informationScalabilitySummary
 
Found a mistake? Please highlight the word and press Shift + Enter  
Next >
 
Subjects
Accounting
Business & Finance
Communication
Computer Science
Economics
Education
Engineering
Environment
Geography
Health
History
Language & Literature
Law
Management
Marketing
Mathematics
Political science
Philosophy
Psychology
Religion
Sociology
Travel