-
1
-
-
46749155835
-
-
Car 2 Car Communication Consortium, Available from: .
-
Car 2 Car Communication Consortium, Available from: .
-
-
-
-
2
-
-
46749107088
-
-
US Department of Transportation, National Highway Traffic Safety Administration, Vehicle safety communications consortium, Available from: .
-
US Department of Transportation, National Highway Traffic Safety Administration, Vehicle safety communications consortium, Available from: .
-
-
-
-
3
-
-
0034482344
-
-
A. Takahashi, N. Asanuma, Introduction of Honda ASV-2 (Advanced Safety Vehicle-Phase 2), in: Proceedings of the IEEE Intelligent Vehicles Symposium, Detroit, USA, 2000, pp. 694-701.
-
A. Takahashi, N. Asanuma, Introduction of Honda ASV-2 (Advanced Safety Vehicle-Phase 2), in: Proceedings of the IEEE Intelligent Vehicles Symposium, Detroit, USA, 2000, pp. 694-701.
-
-
-
-
4
-
-
34247373106
-
-
J.-S. Park, U. Lee, S.Y. Oh, M. Gerla, D.S. Lun, Emergency related video streaming in VANET using network coding, in: Proceedings of the ACM Workshop on Vehicular Ad Hoc Networks (VANET), Los Angeles, CA, 2006, pp. 102-103.
-
J.-S. Park, U. Lee, S.Y. Oh, M. Gerla, D.S. Lun, Emergency related video streaming in VANET using network coding, in: Proceedings of the ACM Workshop on Vehicular Ad Hoc Networks (VANET), Los Angeles, CA, 2006, pp. 102-103.
-
-
-
-
5
-
-
46749087425
-
-
B. Parno, A. Perrig, Challenges in securing vehicular networks, in: Proceedings of ACM HotNets, 2005.
-
B. Parno, A. Perrig, Challenges in securing vehicular networks, in: Proceedings of ACM HotNets, 2005.
-
-
-
-
7
-
-
84947273682
-
-
J. Douceur, The Sybil attack, in: Lecture Notes in Computer Science: Revised Papers from the First International Workshop on Peer-to-Peer Systems, vol. 2429, 2002, pp. 251-260.
-
J. Douceur, The Sybil attack, in: Lecture Notes in Computer Science: Revised Papers from the First International Workshop on Peer-to-Peer Systems, vol. 2429, 2002, pp. 251-260.
-
-
-
-
8
-
-
14944372809
-
-
P. Golle, D. Greene, J. Staddon, Detecting and correcting malicious data in VANETs, in: Proceedings of the ACM Workshop on Vehicular Ad Hoc Networks (VANET), Philadelphia, PA, 2004, pp. 29-37.
-
P. Golle, D. Greene, J. Staddon, Detecting and correcting malicious data in VANETs, in: Proceedings of the ACM Workshop on Vehicular Ad Hoc Networks (VANET), Philadelphia, PA, 2004, pp. 29-37.
-
-
-
-
9
-
-
46749156658
-
-
T. Leinmüller, E. Schoch, Greedy routing in highway scenarios: the impact of position faking nodes, in: Proceedings of the Workshop on Intelligent Transportation (WIT), 2006.
-
T. Leinmüller, E. Schoch, Greedy routing in highway scenarios: the impact of position faking nodes, in: Proceedings of the Workshop on Intelligent Transportation (WIT), 2006.
-
-
-
-
10
-
-
34247376546
-
-
T. Leinmüller, E. Schoch, F. Kargl, C. Maihöfer, Improved security in geographic ad hoc routing through autonomous position verification, in: Proceedings of the ACM Workshop on Vehicular Ad Hoc Networks (VANET), Los Angeles, CA, 2006, pp. 57-66.
-
T. Leinmüller, E. Schoch, F. Kargl, C. Maihöfer, Improved security in geographic ad hoc routing through autonomous position verification, in: Proceedings of the ACM Workshop on Vehicular Ad Hoc Networks (VANET), Los Angeles, CA, 2006, pp. 57-66.
-
-
-
-
11
-
-
33745948310
-
-
M. Raya, J.-P. Hubaux, The security of vehicular ad hoc networks, in: Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks, Alexandria, VA, 2005, pp. 11-21.
-
M. Raya, J.-P. Hubaux, The security of vehicular ad hoc networks, in: Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks, Alexandria, VA, 2005, pp. 11-21.
-
-
-
-
12
-
-
46749112220
-
-
T. Leinmüller, E. Schoch, F. Kargl, C. Maihöfer, Influence of falsified position data on geographic ad-hoc routing, in: Proceedings of the European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS), 2005.
-
T. Leinmüller, E. Schoch, F. Kargl, C. Maihöfer, Influence of falsified position data on geographic ad-hoc routing, in: Proceedings of the European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS), 2005.
-
-
-
-
13
-
-
15544382860
-
-
S.-T. Yuan, J. Sun, Ontology-based structured cosine similarity in speech document summarization, in: Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence, Washington, DC, USA, 2004, pp. 508-513.
-
S.-T. Yuan, J. Sun, Ontology-based structured cosine similarity in speech document summarization, in: Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence, Washington, DC, USA, 2004, pp. 508-513.
-
-
-
-
15
-
-
34247336902
-
-
M. Raya, A. Aziz, J.-P. Hubaux, Efficient secure aggregation in VANETs, in: Proceedings of the ACM Workshop on Vehicular Ad Hoc Networks (VANET), Los Angeles, CA, 2006, pp. 67-75.
-
M. Raya, A. Aziz, J.-P. Hubaux, Efficient secure aggregation in VANETs, in: Proceedings of the ACM Workshop on Vehicular Ad Hoc Networks (VANET), Los Angeles, CA, 2006, pp. 67-75.
-
-
-
-
17
-
-
25844439422
-
-
S. Capkun, J.-P. Hubaux, Secure positioning of wireless devices with application to sensor networks, in: Proceedings of IEEE INFOCOM, vol. 3, 2005, pp. 1917-1928.
-
S. Capkun, J.-P. Hubaux, Secure positioning of wireless devices with application to sensor networks, in: Proceedings of IEEE INFOCOM, vol. 3, 2005, pp. 1917-1928.
-
-
-
-
18
-
-
35048826237
-
-
M.G. Kuhn, An asymmetric security mechanism for navigation signals, in: Proceedings of the Workshop on Information Hiding, Toronto, Canada, 2004, pp. 239-252.
-
M.G. Kuhn, An asymmetric security mechanism for navigation signals, in: Proceedings of the Workshop on Information Hiding, Toronto, Canada, 2004, pp. 239-252.
-
-
-
-
19
-
-
46749098569
-
-
F. Armknecht, A. Festag, D. Westhoff, K. Zeng, Cross-layer privacy enhancement and non-repudiation in vehicular communication, in: Proceedings of the Workshop on Mobile Ad-Hoc Networks (WMAN), Bern, Switzerland, 2007.
-
F. Armknecht, A. Festag, D. Westhoff, K. Zeng, Cross-layer privacy enhancement and non-repudiation in vehicular communication, in: Proceedings of the Workshop on Mobile Ad-Hoc Networks (WMAN), Bern, Switzerland, 2007.
-
-
-
-
20
-
-
36949010773
-
-
J.Y. Choi, P. Golle, M. Jakobsson, Tamper-evident digital signatures: Protecting certification authorities against malware, in: Proceedings of the IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC), 2006, pp. 37-44.
-
J.Y. Choi, P. Golle, M. Jakobsson, Tamper-evident digital signatures: Protecting certification authorities against malware, in: Proceedings of the IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC), 2006, pp. 37-44.
-
-
-
-
21
-
-
33750938846
-
-
K. Plößl, T. Nowey, C. Mletzko, Towards a security architecture for vehicular ad hoc networks, in: Proceedings of the International Conference on Availability, Reliability and Security (ARES), Washington, DC, USA, 2006, pp. 374-381.
-
K. Plößl, T. Nowey, C. Mletzko, Towards a security architecture for vehicular ad hoc networks, in: Proceedings of the International Conference on Availability, Reliability and Security (ARES), Washington, DC, USA, 2006, pp. 374-381.
-
-
-
-
22
-
-
24344445903
-
-
F. Dai, J. Wu, Proactive route maintenance in wireless ad hoc networks, in: Proceedings of the IEEE International Conference on Communications (ICC), vol. 2, 2005, pp. 1236-1240.
-
F. Dai, J. Wu, Proactive route maintenance in wireless ad hoc networks, in: Proceedings of the IEEE International Conference on Communications (ICC), vol. 2, 2005, pp. 1236-1240.
-
-
-
-
23
-
-
1542317849
-
-
N. Sastry, U. Shankar, D. Wagner, Secure verification of location claims, in: Proceedings of the ACM Workshop on Wireless Security (WiSe), San Diego, CA, 2003, pp. 1-10.
-
N. Sastry, U. Shankar, D. Wagner, Secure verification of location claims, in: Proceedings of the ACM Workshop on Wireless Security (WiSe), San Diego, CA, 2003, pp. 1-10.
-
-
-
-
24
-
-
33745453101
-
-
T. Suen, A. Yasinsac, Ad hoc network security: Peer identification and authentication using signal properties, in: Systems, Man and Cybernetics (SMC) Information Assurance Workshop, 2005, pp. 432-433.
-
T. Suen, A. Yasinsac, Ad hoc network security: Peer identification and authentication using signal properties, in: Systems, Man and Cybernetics (SMC) Information Assurance Workshop, 2005, pp. 432-433.
-
-
-
-
25
-
-
34247328623
-
-
B. Xiao, B. Yu, C. Gao, Detection and localization of Sybil nodes in VANETs, in: Proceedings of the Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks, Los Angeles, CA, USA, 2006, pp. 1-8.
-
B. Xiao, B. Yu, C. Gao, Detection and localization of Sybil nodes in VANETs, in: Proceedings of the Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks, Los Angeles, CA, USA, 2006, pp. 1-8.
-
-
-
-
26
-
-
3042785862
-
-
J. Newsome, E. Shi, D. Song, A. Perrig, The Sybil attack in sensor networks: analysis & defenses, in: Proceedings of International Symposium on Information Processing in Sensor Networks (IPSN), Berkeley, CA, 2004, pp. 259-268.
-
J. Newsome, E. Shi, D. Song, A. Perrig, The Sybil attack in sensor networks: analysis & defenses, in: Proceedings of International Symposium on Information Processing in Sensor Networks (IPSN), Berkeley, CA, 2004, pp. 259-268.
-
-
-
-
27
-
-
46749117954
-
-
C. Piro, C. Shields, B.N. Levine, Detecting the Sybil attack in mobile ad hoc network, in: Proceedings of the International Conference on Security and Privacy in Communication Networks, 2006, pp. 1-11.
-
C. Piro, C. Shields, B.N. Levine, Detecting the Sybil attack in mobile ad hoc network, in: Proceedings of the International Conference on Security and Privacy in Communication Networks, 2006, pp. 1-11.
-
-
-
-
28
-
-
46749118992
-
-
Sensor Technologies and Systems, Forward looking vehicle radar system (FLVRS), Available from: , 2006.
-
Sensor Technologies and Systems, Forward looking vehicle radar system (FLVRS), Available from: , 2006.
-
-
-
-
29
-
-
46749115986
-
-
Toyota, Pre-crash safety, Available from: , 2007.
-
Toyota, Pre-crash safety, Available from: , 2007.
-
-
-
-
30
-
-
46749121374
-
-
US Department of Transportation, National Highway Traffic Safety Administration, Event data recorders, Federal Motor Vehicle Safety Standards 215 Part 49, Code of Federal Regulations Part 563, 2006.
-
US Department of Transportation, National Highway Traffic Safety Administration, Event data recorders, Federal Motor Vehicle Safety Standards 215 Part 49, Code of Federal Regulations Part 563, 2006.
-
-
-
-
31
-
-
46749110379
-
-
US Department of Transportation, National Highway Traffic Safety Administration, Event Data Recorders Q&As, Available from: , August, 2006.
-
US Department of Transportation, National Highway Traffic Safety Administration, Event Data Recorders Q&As, Available from: , August, 2006.
-
-
-
-
32
-
-
35348977820
-
Eviction of misbehaving and faulty nodes in vehicular networks
-
Raya M., Papadimitratos P., Aad I., Jungels D., and Hubaux J.-P. Eviction of misbehaving and faulty nodes in vehicular networks. IEEE Journal on Selected Areas in Communications 25 8 (2007) 1557-1568
-
(2007)
IEEE Journal on Selected Areas in Communications
, vol.25
, Issue.8
, pp. 1557-1568
-
-
Raya, M.1
Papadimitratos, P.2
Aad, I.3
Jungels, D.4
Hubaux, J.-P.5
-
33
-
-
0031381841
-
-
Z.J. Haas, A new routing protocol for the reconfigurable wireless networks, in: Proceedings of the IEEE Conference on Universal Personal Communications, vol. 2, 1997, pp. 562-566.
-
Z.J. Haas, A new routing protocol for the reconfigurable wireless networks, in: Proceedings of the IEEE Conference on Universal Personal Communications, vol. 2, 1997, pp. 562-566.
-
-
-
-
34
-
-
46749113436
-
-
M. Käsemann, H. Füler, H. Hartenstein,, M. Mauve, A reactive location service for mobile ad hoc networks, Tech. Rep. TR-02-014, Department of Computer Science, University of Mannheim, 2002.
-
M. Käsemann, H. Füler, H. Hartenstein,, M. Mauve, A reactive location service for mobile ad hoc networks, Tech. Rep. TR-02-014, Department of Computer Science, University of Mannheim, 2002.
-
-
-
-
35
-
-
34247368518
-
-
F. Picconi, N. Ravi, M. Gruteser, L. Iftode, Probabilistic validation of aggregated data in vehicular ad-hoc networks, in: Proceedings of the ACM Workshop on Vehicular Ad Hoc Networks (VANET), Los Angeles, CA, 2006, pp. 76-85.
-
F. Picconi, N. Ravi, M. Gruteser, L. Iftode, Probabilistic validation of aggregated data in vehicular ad-hoc networks, in: Proceedings of the ACM Workshop on Vehicular Ad Hoc Networks (VANET), Los Angeles, CA, 2006, pp. 76-85.
-
-
-
-
36
-
-
0033714823
-
-
L. Tian, Y. Zhou, L. Tang, Improving GPS positioning precision by using optical encoders, in: Proceedings of Intelligent Transportation Systems, Dearborn, MI, 2000, pp. 293-298.
-
L. Tian, Y. Zhou, L. Tang, Improving GPS positioning precision by using optical encoders, in: Proceedings of Intelligent Transportation Systems, Dearborn, MI, 2000, pp. 293-298.
-
-
-
|