Acknowledgements: Many thanks to Xiaodong Lin, Rongxing Lu and Huang Lin for their valuable contributions to this site.
ternational Journal of Autonomous and Adaptive Communications Systems, Special Issue on
Security, Trust, and Privacy in DTN and Vehicular Communications, [HTML][Manuscript Due, Jun. 1, 2008]
Inderscience International Journal of Vehicle Information and Communication Systems (IJVICS), Special Issue on
Information and Communication Technologies in Vehicle Navigation, [HTML][Manuscript Due, Jan. 31, 2008]
Wiley's Security and Communication Networks Journal, Special Issue on
Security and Privacy Preservation in Vehicular Communications, [HTML] [PDF][Manuscript Due, Jan. 20, 2008]
IEEE Transactions on Vehicular Technology, Special Section on Vehicular
Communication Networks, [HTML]
ACM VANET, ACM international workshop on Vehicular ad hoc networks 
[CCKN08] Ling Cheung, Joseph A. Cooley, Roger Khazan and Calvin Newport. Collusion-Resistant Group Key Management Using Attribute-Based Encryption. In GOCP, 2008.
[GJPS08] V. Goyal , A. Jain, O. Pandey , and A. Sahai . Bounded ciphertext policy attribute based encryption. In ICALP, 2008.
[K08] Dalia Khader , Authenticating with Attributes, Eprint 2008.
[KSW08] Jonathan Katz , Amit Sahai , Brent Waters: Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. EUROCRYPT 2008 : 146-162.
[LCLS08] Huang Lin, Zhenfu Cao, Xiaohui Liang and Jun Shao. Secure threshold multi authority attribute based encryption without a central authority, INDOCRYPT 2008 , Kharagpur, India, December 14-17, 2008.
[LK08] Jin Li and Kwangjo Kim , Attribute-Based Ring Signatures, Eprint 2008.
[B07] Xavier Boyen : General Ad Hoc Encryption from Exponent Inversion IBE. EUROCRYPT 2007 : 394-411.
[BSW07] J. Bethencourt , A. Sahai , and B. Waters. Ciphertext -policy attribute-based encryption. In IEEE Symposium on Security and Privacy , pages 321-334, 2007.
[BW07] Dan Boneh , Brent Waters: Conjunctive, Subset, and Range Queries on Encrypted Data. TCC 2007 : 535-554.
[C07] M. Chase. Multi-authority attribute based encryption. In TCC , pages 515-534, 2007.
L. Cheung and C. Newport. Provably secure ciphertext policy abe . In ACM Conference on Computer and Communications Security , pages 456-465, 2007.
[KTS07] A. Kapadia , P. Tsang, and S. W. Smith, "Attribute-Based Publishing with Hidden Credentials and Hidden Policies," NDSS '07 , 2007.
[OSW07] R. Ostrovsky , A. Sahai , and B. Waters. Attribute-based encryption with non-monotonic access structures. In ACM Conference on Computer and Communications Security , pages 195-203, 2007.
[SBCSP07] Elaine Shi, John Bethencourt , Hubert T.-H. Chan , Dawn Xiaodong Song , Adrian Perrig : Multi-Dimensional Range Query over Encrypted Data. IEEE Symposium on Security and Privacy 2007 : 350-364.
[GPSW06] V. Goyal , O. Pandey , A. Sahai , and B. Waters. Attribute-based encryption for fine-grained access control of encrypted data. In ACM Conference on Computer and Communications Security , pages 89-98, 2006.
[PTMW06] M. Pirretti , P. Traynor , P. McDaniel, and B. Waters. Secure attribute-based systems. In ACM Conference on Computer and Communications Security , pages 99-112, 2006.