메뉴 건너뛰기




Volumn 60, Issue 2, 2004, Pages 1218-1222

Stealth attacks in vehicular technologies

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION ANALYSIS; PACKET NETWORKS; RISK ASSESSMENT; ROUTERS; TELECOMMUNICATION SERVICES; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 17144390794     PISSN: 15502252     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (6)

References (19)
  • 8
    • 84871044906 scopus 로고    scopus 로고
    • Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior
    • C. DELLAROCAS. Immunizing Online Reputation Reporting Systems Against Unfair Ratings and Discriminatory Behavior. Proceedings of ACM Conference on Electronic Commerce, 2000.
    • (2000) Proceedings of ACM Conference on Electronic Commerce
    • Dellarocas, C.1
  • 9
    • 17144432103 scopus 로고    scopus 로고
    • http://www.vtsociety.org/, 2004.
    • (2004)
  • 14
    • 0035509489 scopus 로고    scopus 로고
    • A survey on position-based routing in mobile ad hoc networks
    • M. MAUVE AND J. WIDMER. A Survey on Position-Based Routing in Mobile Ad Hoc Networks. IEEE Network, 2001.
    • (2001) IEEE Network
    • Mauve, M.1    Widmer, J.2
  • 16
    • 0242426103 scopus 로고    scopus 로고
    • The TESLA broadcast authentication protocol
    • A. PERRIG, R. CANETTI, J.D. TYGAR, AND D. SONG. The TESLA Broadcast Authentication Protocol. RSA CryptoBytes http://www.rsasecurity.com/rsalabs/cryptobytes/, 2002.
    • (2002) RSA CryptoBytes
    • Perrig, A.1    Canetti, R.2    Tygar, J.D.3    Song, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.