References
- Ghosh M, Varghese A, Kherani A, Gupta A. Distributed misbehavior detection in VANETs. IEEE Wireless Communications and Networking Conference. IEEE, 2009.
- Federal Communications Commission. Amendment of the commission's rules regarding dedicated short-range communication service in the 5.850-5.925 ghz band. https://www.fcc.gov/document/amendment-commissions-rules-regarding-dedicated-short-range accessed January 2022.
- Draft guide for Wireless Access in Vehicular Environment (WAVE) Architecture', https://ieeexplore.ieee.org/document/6531627/ accessed January 2022.
- Benyamina Z, Benahmed K, Bounaama F. ANEL: A novel efficient and lightweight authentication scheme for vehicular ad hoc networks. Computer Networks 164 (2019): 106899.
- Li B, Zhang D, Sun L, Chen C. Hunting or waiting? Discovering passenger-finding strategies from a large-scale real-world taxi dataset. 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). IEEE, 2011.
- Koblitz N. Elliptic curve cryptosystems. Mathematics of Computation 1987; 48(177): 201-209. https://doi.org/10.1090/S0025-5718-1987-0866109-5
- Barreto PSLM, Libert B, McCullagh N, Quisquater JJ. Efficient and provably-secure identity-based signatures and sign encryption from bilinear maps. In Advances in Cryptology - ASIACRYPT 2005, vol. 3788, Lecture Notes in Computer Science. Springer: Chennai, India; 515-532.
- Odlyzko AM. Discrete logarithms and their cryptographic significance. In Advances in Cryptology: Proceedings of Eurocrypt 84. Springer-Verlag: New York, 1985; 224-314.
- ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 1985; IT 31: 469-472. https://doi.org/10.1109/TIT.1985.1057074
- Pateriya RK, Vasudevan S. Elliptic curve cryptography in constrained environments: a review. IEEE 2011 International Conference on Communication Systems and Network Technologies, Bhopal,India, Sep-2011 ; 120-124.
- Diffie W, Hellman M. New directions in cryptography. IEEE Transactions on Information Theory 1976; 22: 644-654. DOI:10.1109/tit.1976.1055638.
- Hankerson D, Menezes A, Vanstone S. Guide to Elliptic Curve Cryptography. Springer: New York, 2004. ISBN 978-0-387-21846-5.
- Rosen K. Discrete Mathematics and Its Applications, 8th edition. McGraw Hill Higher Education: New York 2018. ISBN 10: 125967651X. ISBN 13: 9781259676512.
- Sengupta A, Kumar R U. Message mapping and reverse mapping in elliptic curve cryptosystem. Security and communication networks. Security Comm. Networks (2016)
- Lewand R. Cryptological mathematics. The Mathematical Association of America 2000, ISBN-13: 978-0883857199.
- Monika , Tomar T , Kumar V , Kumar Y . Implementation of Elliptic Curve Cryptography. International Journal of Electrical Engineering and Technology (IJEET), Volume 11, Issue 2, March-April 2020
- Christof P, Jan P. Understanding Cryptography: A textbook for Students and Practitioners. Springer-Verlag Berlin Heidelberg 2014. ISBN: 978-3642446498
- Muthukuru J, Sathyanarayana B. Fixed and variable size text based message mapping techniques using ECC. Global Journal of Computer Science and Technology 2012; 12(3): 12-18, Version 1.0.
- Laiphrakpam D S, Khumanthem M S. Implementation of Text Encryption using Elliptic Curve Cryptography. Procedia Computer Science 54 (2015) 73 - 82. Organizing committee of the Eleventh International Multi-Conference on Information Processing-2015. https://doi.org/10.1016/j.procs.2015.06.009