메뉴 건너뛰기




Volumn , Issue , 2007, Pages 84-91

Security requirements and solution concepts in vehicular ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

VEHICULAR AD HOC NETWORKS; WARNING MESSAGES;

EID: 34547529829     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WONS.2007.340489     Document Type: Conference Paper
Times cited : (69)

References (14)
  • 2
    • 34547542707 scopus 로고    scopus 로고
    • Network on Wheels
    • Online, Available:, http://www.network-on-wheels.de
    • NoW, "Network on Wheels," http://www.network-on-wheels.de, 2005. [Online]. Available: http://www.network-on-wheels.de
    • (2005)
    • NoW1
  • 3
    • 84858109781 scopus 로고    scopus 로고
    • C2C-CC, Car2Car Communication Consortium, Online, Available: http://www.car-to-car.org
    • C2C-CC, "Car2Car Communication Consortium," http://www.car-to-car.org/. [Online]. Available: http://www.car-to-car.org/
  • 4
    • 34547509102 scopus 로고    scopus 로고
    • VSCC, US Vehicle Safety Communication Consortium, http://www-nrd.nhtsa.dot.gov/pdf/nrd-12/CAMP3/pages/VSCC.htm. [Online]. Available: http://www-nrd.nhtsa.dot.gov/pdf/nrd-12/CAMP3/pages/VSCC.htm
    • VSCC, "US Vehicle Safety Communication Consortium," http://www-nrd.nhtsa.dot.gov/pdf/nrd-12/CAMP3/pages/VSCC.htm. [Online]. Available: http://www-nrd.nhtsa.dot.gov/pdf/nrd-12/CAMP3/pages/VSCC.htm
  • 7
    • 3042594839 scopus 로고    scopus 로고
    • The Security and Privacy of Smart Vehicles
    • Online, Available
    • J.-P. Hubaux, S. Capkun, and J. Luo, "The Security and Privacy of Smart Vehicles," IEEE Security and Privacy, vol. 4, no. 3, pp. 49-55, 2004. [Online]. Available: http://lcawww.epfl.ch/Publications/luo/ HubauxCL04.pdf
    • (2004) IEEE Security and Privacy , vol.4 , Issue.3 , pp. 49-55
    • Hubaux, J.-P.1    Capkun, S.2    Luo, J.3
  • 11
    • 33645797144 scopus 로고    scopus 로고
    • Tradeoffs in certificate revocation schemes
    • Online, Available
    • P. Zheng, "Tradeoffs in certificate revocation schemes," SIGCOMM Comput. Commun. Rev., vol. 33, no. 2, pp. 103-112, 2003. [Online]. Available: http://doi.acm.Org/10.1145/956981.956991
    • (2003) SIGCOMM Comput. Commun. Rev , vol.33 , Issue.2 , pp. 103-112
    • Zheng, P.1
  • 13
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile wireless networks
    • Online, Available
    • Y. Zhang, W Lee, and Y.-A. Huang, "Intrusion detection techniques for mobile wireless networks," Wirel. Netw., vol. 9, no. 5, pp. 545-556, 2003. [Online]. Available: http://www-static.cc.gatech.edu/~yian/ Zhang_03.pdf
    • (2003) Wirel. Netw , vol.9 , Issue.5 , pp. 545-556
    • Zhang, Y.1    Lee, W.2    Huang, Y.-A.3
  • 14
    • 84858109780 scopus 로고    scopus 로고
    • T Leinmüller, A. Held, G. Schäfer, and A. Wolisz, Intrusion Detection in VANETs, in In proceedings of 12th IEEE International Conference on Network Protocols (ICNP 2004) Student Poster Session, Oct. 2004. [Online]. Available: http://leinmueller.de/index.php/ Main/Publications
    • T Leinmüller, A. Held, G. Schäfer, and A. Wolisz, "Intrusion Detection in VANETs," in In proceedings of 12th IEEE International Conference on Network Protocols (ICNP 2004) Student Poster Session, Oct. 2004. [Online]. Available: http://leinmueller.de/index.php/ Main/Publications


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.