-
1
-
-
1342281463
-
The threat of intelligent collisions
-
Jan.-Feb
-
J. Blum and A. Eskandarian, "The threat of intelligent collisions," IT Professional, vol. 6, no. 1, pp. 24-29, Jan.-Feb. 2004.
-
(2004)
IT Professional
, vol.6
, Issue.1
, pp. 24-29
-
-
Blum, J.1
Eskandarian, A.2
-
3
-
-
37149046758
-
Securing vehicular communications - assumptions, requirements, and principles
-
P. Papadimitratos, V. Gligor, and J.-P. Hubaux, "Securing vehicular communications - assumptions, requirements, and principles," in Workshop on Embedded Security in Cars (escar'06), 2006.
-
(2006)
Workshop on Embedded Security in Cars (escar'06)
-
-
Papadimitratos, P.1
Gligor, V.2
Hubaux, J.-P.3
-
4
-
-
84888735687
-
-
IEEE P1609.2 Version 1 - Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages, In development, 2006.
-
"IEEE P1609.2 Version 1 - Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages," In development, 2006.
-
-
-
-
5
-
-
33845580544
-
VaneSe - An approach to VANET security
-
M. Gerlach, "VaneSe - An approach to VANET security," in V2VCOM, 2005.
-
(2005)
V2VCOM
-
-
Gerlach, M.1
-
6
-
-
14944342986
-
Efficient attribute authentication, with applications to ad hoc networks
-
M. Jakobsson and S. Wetzel, "Efficient attribute authentication, with applications to ad hoc networks," in Proceedings of VANET'04, 2004.
-
(2004)
Proceedings of VANET'04
-
-
Jakobsson, M.1
Wetzel, S.2
-
7
-
-
33845564340
-
Securing vehicular communications
-
M. Raya, P. Papadimitratos, and J.-P. Hubaux, "Securing vehicular communications," IEEE Wireless Communications Magazine, vol. 13, no. 5, pp. 8-15, 2006.
-
(2006)
IEEE Wireless Communications Magazine
, vol.13
, Issue.5
, pp. 8-15
-
-
Raya, M.1
Papadimitratos, P.2
Hubaux, J.-P.3
-
8
-
-
32144446861
-
Security issues in a future vehicular network
-
M. E. Zarki, S. Mehrotra, G. Tsudik, and N. Venkatasubramanian, "Security issues in a future vehicular network," in European Wireless, 2002.
-
(2002)
European Wireless
-
-
Zarki, M.E.1
Mehrotra, S.2
Tsudik, G.3
Venkatasubramanian, N.4
-
9
-
-
0041291986
-
-
RFC 3280
-
R. Housley, W. Polk, W. Ford, and D. Solo, "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile," RFC 3280, 2002.
-
(2002)
Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
-
-
Housley, R.1
Polk, W.2
Ford, W.3
Solo, D.4
-
11
-
-
84888750543
-
-
Standard Specification for Telecommunications and Information Exchange Between Roadside and Vehicle Systems - 5 GHz Band Dedicated Short Range Communications (DSRC) Medium Access Control (MAC) and Physical Layer (PHY) Specifications, ASTM E2213-03, 2003.
-
"Standard Specification for Telecommunications and Information Exchange Between Roadside and Vehicle Systems - 5 GHz Band Dedicated Short Range Communications (DSRC) Medium Access Control (MAC) and Physical Layer (PHY) Specifications," ASTM E2213-03, 2003.
-
-
-
-
12
-
-
31344435929
-
Cryptographic processors - A survey
-
R. Anderson, M. Bond, J. Clulow, and S. Skorobogatov, "Cryptographic processors - A survey," Proceedings of the IEEE, vol. 94, no. 2, pp. 357-369, 2006.
-
(2006)
Proceedings of the IEEE
, vol.94
, Issue.2
, pp. 357-369
-
-
Anderson, R.1
Bond, M.2
Clulow, J.3
Skorobogatov, S.4
-
14
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. Bloom, "Space/time trade-offs in hash coding with allowable errors," Communications of the ACM, vol. 13, no. 7, pp. 422-426, 1970.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
15
-
-
1842665110
-
Intrusion detection in wireless ad hoc networks
-
Feb
-
A. Mishra, K. Nadkarni, and A. Patcha, "Intrusion detection in wireless ad hoc networks," IEEE Wireless Communications, vol. 11, no. 1, pp. 48-60, Feb. 2004.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.1
, pp. 48-60
-
-
Mishra, A.1
Nadkarni, K.2
Patcha, A.3
-
16
-
-
34247376546
-
Improved security in geographic ad hoc routing through autonomous position verification
-
T. Leinmüller, C. Maihöfer, E. Schoch, and F. Kargl, "Improved security in geographic ad hoc routing through autonomous position verification," in Proceedings of VANET06, 2006.
-
(2006)
Proceedings of VANET06
-
-
Leinmüller, T.1
Maihöfer, C.2
Schoch, E.3
Kargl, F.4
-
17
-
-
31544436627
-
Denial-of-Service attack-detection techniques
-
Jan.-Feb
-
G. Carl, G. Kesidis, R. Brooks, and S. Rai, "Denial-of-Service attack-detection techniques," IEEE Internet Computing, vol. 10, no. 1, pp. 82-89, Jan.-Feb. 2006.
-
(2006)
IEEE Internet Computing
, vol.10
, Issue.1
, pp. 82-89
-
-
Carl, G.1
Kesidis, G.2
Brooks, R.3
Rai, S.4
-
18
-
-
0001927585
-
On information and sufficiency
-
Mar
-
S. Kullback and R. Leibler, "On information and sufficiency," The Annals of Mathematical Statistics, vol. 22, no. 1, pp. 79-86, Mar. 1951.
-
(1951)
The Annals of Mathematical Statistics
, vol.22
, Issue.1
, pp. 79-86
-
-
Kullback, S.1
Leibler, R.2
-
19
-
-
0003681739
-
-
New York, NY, USA: John Wiley & Sons, Inc
-
P. Rousseeuw and A. Leroy, Robust regression and outlier detection. New York, NY, USA: John Wiley & Sons, Inc., 1987.
-
(1987)
Robust regression and outlier detection
-
-
Rousseeuw, P.1
Leroy, A.2
-
20
-
-
84893405732
-
Data clustering: A review
-
A. Jain, M. Murty, and P. Flynn, "Data clustering: a review," ACM Comput. Surv., vol. 31, no. 3, pp. 264-323, 1999.
-
(1999)
ACM Comput. Surv
, vol.31
, Issue.3
, pp. 264-323
-
-
Jain, A.1
Murty, M.2
Flynn, P.3
-
21
-
-
33644591301
-
The complexity of approximating the entropy
-
T. Batu, S. Dasgupta, R. Kumar, and R. Rubinfeld, "The complexity of approximating the entropy," SIAM Journal on Computing, vol. 35, no. 1, pp. 132-150, 2005.
-
(2005)
SIAM Journal on Computing
, vol.35
, Issue.1
, pp. 132-150
-
-
Batu, T.1
Dasgupta, S.2
Kumar, R.3
Rubinfeld, R.4
-
22
-
-
79952067130
-
A certificate revocation scheme for wireless ad hoc networks
-
C. Crépeau and C. Davis, "A certificate revocation scheme for wireless ad hoc networks," in Proceedings of SASN'03, 2003.
-
(2003)
Proceedings of SASN'03
-
-
Crépeau, C.1
Davis, C.2
-
23
-
-
0042933944
-
Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
-
S. Zhong, J. Chen, and Y. Yang, "Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks," in Proceedings of Infocom'03, 2003.
-
(2003)
Proceedings of Infocom'03
-
-
Zhong, S.1
Chen, J.2
Yang, Y.3
-
27
-
-
84888682468
-
-
http://ivc.epfl.ch.
-
-
-
-
28
-
-
3242880752
-
Digital certificates: A survey of revocation methods
-
P. Wohlmacher, "Digital certificates: a survey of revocation methods," in Proceedings of Multimedia'00, 2000.
-
(2000)
Proceedings of Multimedia'00
-
-
Wohlmacher, P.1
-
29
-
-
33645797144
-
Tradeoffs in certificate revocation schemes
-
P. Zheng, "Tradeoffs in certificate revocation schemes," SIGCOMM Computing Communication Review, vol. 33, no. 2, pp. 103-112, 2003.
-
(2003)
SIGCOMM Computing Communication Review
, vol.33
, Issue.2
, pp. 103-112
-
-
Zheng, P.1
-
31
-
-
33845726678
-
Securing vehicular ad hoc networks
-
M. Raya and J.-P. Hubaux, "Securing vehicular ad hoc networks," Journal of Computer Security, Special Issue on Security of Ad Hoc and Sensor Networks, vol. 15, no. 1, pp. 39 - 68, 2007.
-
(2007)
Journal of Computer Security, Special Issue on Security of Ad Hoc and Sensor Networks
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.-P.2
-
32
-
-
47349131000
-
Architecture for secure and private vehicular communications
-
P. Papadimitratos, L. Buttyan, J.-P. Hubaux, F. Kargl, A. Kung, and M. Raya, "Architecture for secure and private vehicular communications," in Proceedings of ITST07, 2007.
-
(2007)
Proceedings of ITST07
-
-
Papadimitratos, P.1
Buttyan, L.2
Hubaux, J.-P.3
Kargl, F.4
Kung, A.5
Raya, M.6
-
33
-
-
37849048533
-
Efficient and robust pseudonymous authentication, in vanets
-
G. Calandriello, P. Papadimitratos, A. Lloy, and J.-P. Hubaux, "Efficient and robust pseudonymous authentication, in vanets," in Proceedings of VANET07, 2007.
-
(2007)
Proceedings of VANET07
-
-
Calandriello, G.1
Papadimitratos, P.2
Lloy, A.3
Hubaux, J.-P.4
-
34
-
-
33750956035
-
An application of information theory to intrusion detection
-
E. Eiland and L. Liebrock, "An application of information theory to intrusion detection," in Proceedings of IWIA'06, 2006.
-
(2006)
Proceedings of IWIA'06
-
-
Eiland, E.1
Liebrock, L.2
-
35
-
-
84942256107
-
Statistical approaches to DDoS attack detection and response
-
L. Feinstein, D. Schnackenberg, R. Balupari, and D. Kindred, "Statistical approaches to DDoS attack detection and response," in Proceedings of the DARPA Information Survivability Conference and Exposition, 2003.
-
(2003)
Proceedings of the DARPA Information Survivability Conference and Exposition
-
-
Feinstein, L.1
Schnackenberg, D.2
Balupari, R.3
Kindred, D.4
-
37
-
-
0033357103
-
Securing ad hoc networks
-
L. Zhou and Z. Haas, "Securing ad hoc networks," IEEE Network, vol. 13, no. 6, pp. 24-30, 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.2
-
38
-
-
0345755816
-
Adaptive security for multilevel ad hoc networks
-
J. Kong, H. Luo, K. Xu, D. Gu, M. Gerla, and S. Lu, "Adaptive security for multilevel ad hoc networks," Wireless Communications and Mobile Computing, vol. 2, no. 5, pp. 533-547, 2002.
-
(2002)
Wireless Communications and Mobile Computing
, vol.2
, Issue.5
, pp. 533-547
-
-
Kong, J.1
Luo, H.2
Xu, K.3
Gu, D.4
Gerla, M.5
Lu, S.6
|