-
1
-
-
85039136104
-
-
http://www.car-2-car.org/.
-
-
-
-
2
-
-
85039145346
-
-
http://www.sevecom.org/.
-
-
-
-
3
-
-
85039139692
-
-
5.9 GHz DSRC.
-
5.9 GHz DSRC. http://grouper.ieee.org/groups/scc32/dsrc/.
-
-
-
-
4
-
-
85039143167
-
-
IBM 4758 PCI Cryptographic Coprocessor, http://www-03.ibm.com/security/ cryptocards/pcicc/overview.shtml.
-
-
-
-
5
-
-
85039145917
-
-
Trusted Platform Module (TPM), https://www.trustedcomputinggroup.org/ groups/tpm/.
-
-
-
-
6
-
-
33749630889
-
-
IEEE P1609.2/D2 Security Services for Applications and Management Messages, November
-
IEEE P1609.2/D2 - Draft Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages, November 2005.
-
(2005)
Draft Standard for Wireless Access in Vehicular Environments
-
-
-
7
-
-
1342281463
-
The threat of intelligent collisions
-
J. Blum and A. Eskandarian, The threat of intelligent collisions, IT Professional 6(1) (2004), 24-29.
-
(2004)
IT Professional
, vol.6
, Issue.1
, pp. 24-29
-
-
Blum, J.1
Eskandarian, A.2
-
9
-
-
0036992249
-
Framework for security and privacy in automotive telematics
-
S. Duri, M. Gruteser, X. Liu, P. Moskowitz, R. Perez, M. Singh and J.-M. Tang, Framework for security and privacy in automotive telematics, in: Proceedings of the 2nd International Workshop on Mobile Commerce, 2002, pp. 25-32.
-
(2002)
Proceedings of the 2nd International Workshop on Mobile Commerce
, pp. 25-32
-
-
Duri, S.1
Gruteser, M.2
Liu, X.3
Moskowitz, P.4
Perez, R.5
Singh, M.6
Tang, J.-M.7
-
10
-
-
33845739834
-
On providing security for an open telematics platform
-
S. Eichler, J. Billion, R. Maier, H.-J. Voegel and R. Kroh, On providing security for an open telematics platform, in: Proceedings of the 5th International Conference on ITS Telecommunications, 2005.
-
(2005)
Proceedings of the 5th International Conference on ITS Telecommunications
-
-
Eichler, S.1
Billion, J.2
Maier, R.3
Voegel, H.-J.4
Kroh, R.5
-
11
-
-
2442560626
-
Retooling the global positioning system
-
May
-
P. Enge, Retooling the Global Positioning System, Scientific American (May) (2004).
-
(2004)
Scientific American
-
-
Enge, P.1
-
14
-
-
33845773477
-
VaneSe - An approach to VANET security
-
M. Gerlach, VaneSe - An approach to VANET security, in: Proceedings of V2VCOM'05, 2005.
-
(2005)
Proceedings of V2VCOM'05
-
-
Gerlach, M.1
-
17
-
-
0003285503
-
Group Key Management Protocol (GKMP) architecture
-
H. Harney and C. Muckenhirn, Group Key Management Protocol (GKMP) architecture, RFC 2094, 1997.
-
(1997)
RFC
, vol.2094
-
-
Harney, H.1
Muckenhirn, C.2
-
18
-
-
3042647758
-
A survey of secure wireless ad hoc routing
-
Y.-C. Hu and A. Perrig, A survey of secure wireless ad hoc routing, IEEE Security & Privacy 2(3) (2004), 28-39.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.3
, pp. 28-39
-
-
Hu, Y.-C.1
Perrig, A.2
-
19
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Y.-C. Hu, A. Perrig and D. Johnson, Ariadne: a secure on-demand routing protocol for ad hoc networks, in: Proceedings of Mobicom'02, 2002, pp. 12-23.
-
(2002)
Proceedings of Mobicom'02
, pp. 12-23
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.3
-
21
-
-
3042594839
-
The security and privacy of smart vehicles
-
J.-P. Hubaux, S. Capkun and J. Luo, The security and privacy of smart vehicles, IEEE Security and Privacy Magazine 2(3) (2004), 49-55.
-
(2004)
IEEE Security and Privacy Magazine
, vol.2
, Issue.3
, pp. 49-55
-
-
Hubaux, J.-P.1
Capkun, S.2
Luo, J.3
-
22
-
-
4043089808
-
-
PhD thesis, University of California at San Diego
-
M. Jakobsson, Privacy vs. Authenticity, PhD thesis, University of California at San Diego, 1997.
-
(1997)
Privacy Vs. Authenticity
-
-
Jakobsson, M.1
-
23
-
-
33845753042
-
-
Technical Report LCA-REPORT-2006-006, EPFL
-
D. Jungels, M. Raya, I. Aad and J.-P. Hubaux, Certificate revocation in vehicular ad hoc networks, Technical Report LCA-REPORT-2006-006, EPFL, 2006.
-
(2006)
Certificate Revocation in Vehicular Ad Hoc Networks
-
-
Jungels, D.1
Raya, M.2
Aad, I.3
Hubaux, J.-P.4
-
25
-
-
0000653210
-
Selecting cryptographic key sizes
-
A.K. Lenstra and E.R. Verheul, Selecting cryptographic key sizes, Journal of Cryptology 14(4) (2001), 255-293.
-
(2001)
Journal of Cryptology
, vol.14
, Issue.4
, pp. 255-293
-
-
Lenstra, A.K.1
Verheul, E.R.2
-
26
-
-
0035789227
-
Medium access and radio resource management for ad hoc networks based on UTRA TDD
-
M. Lott, R. Halfmann, E. Schultz and M. Radimirsch, Medium access and radio resource management for ad hoc networks based on UTRA TDD, in: Proceedings of Mobihoc'01, 2001, pp. 76-86.
-
(2001)
Proceedings of Mobihoc'01
, pp. 76-86
-
-
Lott, M.1
Halfmann, R.2
Schultz, E.3
Radimirsch, M.4
-
27
-
-
33745940289
-
Car-to-car communication - Market introduction and success factors
-
K. Matheus, R. Morich, I. Paulus, C. Menig, A. Lübke, B. Rech and W. Specks, Car-to-Car Communication - Market introduction and success factors, in: Proceedings of ITS'05: 5th European Congress and Exhibition on Intelligent Transport Systems and Services, 2005.
-
(2005)
Proceedings of ITS'05: 5th European Congress and Exhibition on Intelligent Transport Systems and Services
-
-
Matheus, K.1
Morich, R.2
Paulus, I.3
Menig, C.4
Lübke, A.5
Rech, B.6
Specks, W.7
-
28
-
-
0035509489
-
A survey on position-based routing in mobile ad hoc networks
-
M. Mauve, J. Widmer and H. Hartenstein, A survey on position-based routing in mobile ad hoc networks, IEEE Network 15(6) (2001), 30-39.
-
(2001)
IEEE Network
, vol.15
, Issue.6
, pp. 30-39
-
-
Mauve, M.1
Widmer, J.2
Hartenstein, H.3
-
31
-
-
0345565893
-
A survey of key management for secure group communication
-
S. Rafaeli and D. Hutchison, A survey of key management for secure group communication, ACM Computing Surveys 35(3) (2003), 309-329.
-
(2003)
ACM Computing Surveys
, vol.35
, Issue.3
, pp. 309-329
-
-
Rafaeli, S.1
Hutchison, D.2
-
33
-
-
33745948310
-
The security of vehicular ad hoc networks
-
M. Raya and J.-P. Hubaux, The security of vehicular ad hoc networks, in: Proceedings of SASN'05, 2005, pp. 11-21.
-
(2005)
Proceedings of SASN'05
, pp. 11-21
-
-
Raya, M.1
Hubaux, J.-P.2
-
34
-
-
80455138227
-
CARAVAN: Providing location privacy for VANET
-
K. Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Matsuura and K. Sezaki, CARAVAN: providing location privacy for VANET, in: Proceedings of the Workshop on Embedded Security in Cars (escar)'05, 2005.
-
(2005)
Proceedings of the Workshop on Embedded Security in Cars (Escar)'05
-
-
Sampigethaya, K.1
Huang, L.2
Li, M.3
Poovendran, R.4
Matsuura, K.5
Sezaki, K.6
-
35
-
-
33745955725
-
Of sticker tags and 5.9 GHz
-
P. Samuel, Of sticker tags and 5.9 GHz, in: ITS International, 2004.
-
(2004)
ITS International
-
-
Samuel, P.1
-
36
-
-
0018545449
-
How to share a secret
-
A. Shamir, How to share a secret, Communications of the ACM 22(11) (1979), 612-613.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
40
-
-
14944368943
-
Vehicle-to-vehicle safety messaging in DSRC
-
Q. Xu, T. Mak, J. Ko and R. Sengupta, Vehicle-to-vehicle safety messaging in DSRC, in: Proceedings of VANET'04, 2004, pp. 19-28.
-
(2004)
Proceedings of VANET'04
, pp. 19-28
-
-
Xu, Q.1
Mak, T.2
Ko, J.3
Sengupta, R.4
|