메뉴 건너뛰기




Volumn 4104 LNCS, Issue , 2006, Pages 266-279

Threats to security in DSRC/WAVE

Author keywords

[No Author keywords available]

Indexed keywords

DATA PRIVACY; ELECTRONIC CRIME COUNTERMEASURES; ELECTRONIC MAIL; GROUND VEHICLES; RELIABILITY; SECURITY OF DATA; TELECOMMUNICATION NETWORKS;

EID: 33749643165     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11814764_22     Document Type: Conference Paper
Times cited : (63)

References (25)
  • 4
    • 33749587396 scopus 로고    scopus 로고
    • SCC32 Committee of the IEEE Intelligent Transportation Systems Society. Draft IEEE Standard, IEEE P1609.3/D14, September
    • SCC32 Committee of the IEEE Intelligent Transportation Systems Society: Wireless Access in Vehicular Environments (WAVE) Networking Services. Draft IEEE Standard, IEEE P1609.3/D14, September 2005.
    • (2005) Wireless Access in Vehicular Environments (WAVE) Networking Services
  • 5
    • 33749587396 scopus 로고    scopus 로고
    • SCC32 Committee of the IEEE Intelligent Transportation Systems Society. Draft IEEE Standard, IEEE P1609.4/D03, April
    • SCC32 Committee of the IEEE Intelligent Transportation Systems Society: Wireless Access in Vehicular Environments (WAVE) Multi-Channel Operation. Draft IEEE Standard, IEEE P1609.4/D03, April 2005.
    • (2005) Wireless Access in Vehicular Environments (WAVE) Multi-channel Operation
  • 7
    • 1342281463 scopus 로고    scopus 로고
    • The threat of intelligent collisions
    • January/February
    • J. Blum and A. Eskandarian: The Threat of Intelligent Collisions. IT Professional, vol. 6, no. 1, January/February 2004, 24-29.
    • (2004) IT Professional , vol.6 , Issue.1 , pp. 24-29
    • Blum, J.1    Eskandarian, A.2
  • 8
    • 84941148715 scopus 로고    scopus 로고
    • Telecommunications and Internet Protocol Harmonization over Networks (TIPHON) release 4; protocol framework definition; methods and protocols for security; part 1: Threat analysis
    • ETSI: Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON) Release 4; Protocol Framework Definition; Methods and Protocols for Security; Part 1: Threat Analysis. Technical Specification ETSI TS 102 165-1 V4.1.1, 2003.
    • (2003) Technical Specification , vol.ETSI TS 102 165-1 V4.1.1
  • 9
    • 0003735741 scopus 로고    scopus 로고
    • Public key cryptography for the financial services industry
    • ANSI Standard, X9.62-2005
    • American National Standards Institute: Public Key Cryptography for the Financial Services Industry, The Elliptic Curve Digital Signature Algorithm (ECDSA). ANSI Standard, X9.62-2005, 2005.
    • (2005) The Elliptic Curve Digital Signature Algorithm (ECDSA)
  • 10
    • 84941163234 scopus 로고    scopus 로고
    • IETF request for comments: 3565, use of Advanced Encryption Standard (AES) encryption algorithm in Cryptographic Message Syntax (CMS)
    • Internet Engineering Task Force: IETF Request for Comments: 3565, Use of Advanced Encryption Standard (AES) Encryption Algorithm in Cryptographic Message Syntax (CMS). IETF RFC 3565, 2003.
    • (2003) IETF RFC , vol.3565
  • 11
    • 84941159384 scopus 로고    scopus 로고
    • [Online]
    • Certicom Research: Standards for Efficient Cryptography, SEC 1: Elliptic Curve Cryptography, Version 1.0. [Online]. Available: http://www.secg.org/ download/aid-385/sec1_final.pdf
    • Elliptic Curve Cryptography, Version 1.0
  • 13
  • 14
    • 30344471832 scopus 로고    scopus 로고
    • Will proposed standard make mobile phones more secure?
    • December
    • N. Leavitt: Will Proposed Standard Make Mobile Phones More Secure? Computer, vol. 38, no. 12, December 2005, 20-22.
    • (2005) Computer , vol.38 , Issue.12 , pp. 20-22
    • Leavitt, N.1
  • 15
    • 77954408441 scopus 로고    scopus 로고
    • [Online]
    • Trusted Computing Group: TCG TPM Specification. [Online]. Available: https://www.trustedcomputinggroup.org/groups/tpm/
    • TCG TPM Specification
  • 16
    • 0023139974 scopus 로고
    • The DARPA packet radio network protocols
    • J. Jubin and J.D. Tornow: The DARPA packet radio network protocols. Proceedings of the IEEE, vol. 75, no. 1, 1987, 21-32.
    • (1987) Proceedings of the IEEE , vol.75 , Issue.1 , pp. 21-32
    • Jubin, J.1    Tornow, J.D.2
  • 24
    • 84941148179 scopus 로고    scopus 로고
    • Cryptographically Generated Addresses (CGA), [Online]
    • T. Aura: IETF Request for Comments 3972, Cryptographically Generated Addresses (CGA), 2005. [Online]. Available: http://www.rfc-archive.org/getrfc. php?rfc=3972
    • (2005) IETF Request for Comments , vol.3972
    • Aura, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.