-
1
-
-
48649107907
-
-
Lee, K.C., Lee, S.-h., Cheung, R., Lee, U., Gerla, M.: First Experience with CarTorrent in a Real Vehicular Ad Hoc Network Testbed. Mobile Networking for Vehicular Environments, 109-114 (2007)
-
(2007)
First Experience with CarTorrent in a Real Vehicular Ad Hoc Network Testbed. Mobile Networking for Vehicular Environments
, pp. 109-114
-
-
Lee, K.C.1
Lee, S.-H.2
Cheung, R.3
Lee, U.4
Gerla, M.5
-
2
-
-
38549142570
-
TPM main specification
-
Trusted Computing Group:, Version 1.2 rev, Trusted Computing Group February
-
Trusted Computing Group: TPM main specification. Main Specification Version 1.2 rev. 85, Trusted Computing Group (February 2005)
-
(2005)
Main Specification
, pp. 85
-
-
-
3
-
-
1342281463
-
The Threat of Intelligent Collisions
-
Blum, J., Eskandarian, A.: The Threat of Intelligent Collisions. IT Professional 6(1), 24-29 (2004)
-
(2004)
IT Professional
, vol.6
, Issue.1
, pp. 24-29
-
-
Blum, J.1
Eskandarian, A.2
-
4
-
-
32144446861
-
-
European Wireless
-
Zarki, M.E., Mehrotra, S., Tsudik, G., Venkatasubramanian, N.: Security Issues in a Future Vehicular Network. European Wireless (2002)
-
(2002)
Security Issues in a Future Vehicular Network
-
-
Zarki, M.E.1
Mehrotra, S.2
Tsudik, G.3
Venkatasubramanian, N.4
-
5
-
-
3042594839
-
The Security and Privacy of Smart Vehicles
-
Hubaux, J., Čapkun, S., Luo, J.: The Security and Privacy of Smart Vehicles. IEEE Security and Privacy 2(3), 49-55 (2004)
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.3
, pp. 49-55
-
-
Hubaux, J.1
Čapkun, S.2
Luo, J.3
-
7
-
-
34548180601
-
Attacks on Inter-Vehicle Communication Systems - An Analysis
-
Aijaz, A., Bochow, B., Dötzer, F., Festag, A., Gerlach, M., Kroh, R., Leinmüller, T.: Attacks on Inter-Vehicle Communication Systems - An Analysis. In: 3rd International Workshop on Intelligent Transportation (2006)
-
(2006)
3rd International Workshop on Intelligent Transportation
-
-
Aijaz, A.1
Bochow, B.2
Dötzer, F.3
Festag, A.4
Gerlach, M.5
Kroh, R.6
Leinmüller, T.7
-
9
-
-
33845564340
-
Securing Vehicular Communications
-
Raya, M., Papadimitratos, P., Hubaux, J.: Securing Vehicular Communications. IEEE Wireless Communications Magazine, Special Issue on Inter-Vehicular Communications 13(5), 8-15 (2006)
-
(2006)
IEEE Wireless Communications Magazine, Special Issue on Inter-Vehicular Communications
, vol.13
, Issue.5
, pp. 8-15
-
-
Raya, M.1
Papadimitratos, P.2
Hubaux, J.3
-
10
-
-
33746097415
-
-
Dötzer, F.: Privacy Issues in Vehicular Ad Hoc Network. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, 3856, pp. 197-209. Springer, Heidelberg (2006)
-
Dötzer, F.: Privacy Issues in Vehicular Ad Hoc Network. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 197-209. Springer, Heidelberg (2006)
-
-
-
-
11
-
-
47349118711
-
Security Architecture for Vehicular Communication
-
Gerlach, M., Festag, A., Leinmüller, T., Goldacker, G., Harsch, C.: Security Architecture for Vehicular Communication. In: Workshop on Intelligent Transportation (2007)
-
(2007)
Workshop on Intelligent Transportation
-
-
Gerlach, M.1
Festag, A.2
Leinmüller, T.3
Goldacker, G.4
Harsch, C.5
-
12
-
-
36349002968
-
Support of Anonymity in VANETs - Putting Pseudonymity into Practice
-
Fonseca, E., Festag, A., Baldessari, R., Aguiar, R.: Support of Anonymity in VANETs - Putting Pseudonymity into Practice. In: IEEE Wireless Communications and Networking Conference (2007)
-
(2007)
IEEE Wireless Communications and Networking Conference
-
-
Fonseca, E.1
Festag, A.2
Baldessari, R.3
Aguiar, R.4
-
13
-
-
84876396429
-
Impact of pseudonym changes on geographic routing in vanets
-
Schoch, E., Kargl, F., Leinmüller, T., Schlott, S., Papadimitratos, P.: Impact of pseudonym changes on geographic routing in vanets. In: European Workshop on Security in Ad-hoc and Sensor Networks, pp. 43-57 (2006)
-
(2006)
European Workshop on Security in Ad-hoc and Sensor Networks
, pp. 43-57
-
-
Schoch, E.1
Kargl, F.2
Leinmüller, T.3
Schlott, S.4
Papadimitratos, P.5
-
15
-
-
33845726678
-
Securing Vehicular Ad Hoc Networks
-
Raya, M., Hubaux, J.: Securing Vehicular Ad Hoc Networks. Journal of Computer Security, Special Issue on Security of Ad Hoc and Sensor Networks 15(1), 39-68 (2007)
-
(2007)
Journal of Computer Security, Special Issue on Security of Ad Hoc and Sensor Networks
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.2
|