-
1
-
-
32144460917
-
-
http://www.ebay.com
-
-
-
-
2
-
-
32144443733
-
-
http://www.onstar.com
-
-
-
-
4
-
-
2442597363
-
Performance analysis of the CONFIDANT protocol: Cooperation of nodes - Fairness in distributed ad hoc networks
-
S. Buchegger and J.-Y. Boudec. Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes - Fairness in Distributed Ad Hoc Networks. In Proceedings of MobiHOC, 2002.
-
(2002)
Proceedings of MobiHOC
-
-
Buchegger, S.1
Boudec, J.-Y.2
-
5
-
-
1342281463
-
The threat of intelligent collisions
-
Jan.-Feb.
-
J. Blum and A. Eskandarian. The Threat of Intelligent Collisions. In IT Professional, 6(1):24-29, Jan.-Feb. 2004.
-
(2004)
IT Professional
, vol.6
, Issue.1
, pp. 24-29
-
-
Blum, J.1
Eskandarian, A.2
-
6
-
-
0019532104
-
-
Communications of the ACM, Feb.
-
D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, volume 24, pp. 84-88, Feb. 1981.
-
(1981)
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
, vol.24
, pp. 84-88
-
-
Chaum, D.1
-
9
-
-
0036992249
-
Framework for security and privacy in automotive telematics
-
Atlanta, Georgia, USA
-
S. Duri, M. Gruteser, X. Lin, P. Moskowitz, R. Perez, M. Singh, and J. Tang. Framework for Security and Privacy in Automotive Telematics. In Proceedings of the 2nd International Workshop on Mobile Commerce, Atlanta, Georgia, USA, pp. 25-32, 2002.
-
(2002)
Proceedings of the 2nd International Workshop on Mobile Commerce
, pp. 25-32
-
-
Duri, S.1
Gruteser, M.2
Lin, X.3
Moskowitz, P.4
Perez, R.5
Singh, M.6
Tang, J.7
-
10
-
-
14944376047
-
-
Federal Communications Commission. FCC 99-305, October
-
Federal Communications Commission. FCC 99-305. FCC Report and Order, October 1999.
-
(1999)
FCC Report and Order
-
-
-
12
-
-
0005063385
-
Onion routing
-
ACM press, New York, February
-
D. Goldschlag, M. Reed, and P. Syverson. Onion routing. Commun. ACM, 42(2):39-41, ACM press, New York, February 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
13
-
-
0030646698
-
Proactive public key and signature systems
-
A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk and M. Yungi Proactive Public Key and Signature Systems. In ACM Conference on Computer and Communications Security, pp. 100-110, 1997.
-
(1997)
ACM Conference on Computer and Communications Security
, pp. 100-110
-
-
Herzberg, A.1
Jakobsson, M.2
Jarecki, S.3
Krawczyk, H.4
Yungi, M.5
-
14
-
-
3042594839
-
The security and privacy of smart vehicles
-
J.-P. Hubaux, S. Capkun, and J. Luo. The Security and Privacy of Smart Vehicles. In IEEE SECURITY & PRIVACY, Vol. 2, No. 3, pp. 49-55, 2004.
-
(2004)
IEEE SECURITY & PRIVACY
, vol.2
, Issue.3
, pp. 49-55
-
-
Hubaux, J.-P.1
Capkun, S.2
Luo, J.3
-
22
-
-
0242426103
-
The TESLA broadcast auithentication protocol
-
A. Perrig, R. Canetti, J. D. Tygar, and D. Song. The TESLA Broadcast Auithentication Protocol. RSA CryptoBytes, 5:(2):2-13, 2002.
-
(2002)
RSA CryptoBytes
, vol.5
, Issue.2
, pp. 2-13
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
|