메뉴 건너뛰기




Volumn , Issue , 2006, Pages

Anonymous and authenticated data provisioning for floating car data systems

Author keywords

[No Author keywords available]

Indexed keywords

CANNING; COMMUNICATION; COMMUNICATION SYSTEMS; REAL TIME SYSTEMS;

EID: 46949107543     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCS.2006.301511     Document Type: Conference Paper
Times cited : (13)

References (14)
  • 1
    • 46949098732 scopus 로고    scopus 로고
    • Security Sub-Project of GST, homepage
    • Security Sub-Project of GST, "GST-SEC subproject homepage," http://www.gstproject.org/sec/, 2006.
    • (2006) GST-SEC subproject
  • 3
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Feb
    • R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 7
    • 46949090136 scopus 로고    scopus 로고
    • EFCD Sub-Project of GST, project.org/efcd
    • EFCD Sub-Project of GST, "GST - enhanced floating car data," http://www.gstproject.org/efcd/, 2005.
    • (2005) GST - enhanced floating car data
  • 8
    • 28844482553 scopus 로고    scopus 로고
    • Federation solutions for inter- and intradomain security in next-generation mobile service platforms
    • Jan
    • Hans-Jörg Vögel, Benjamin Weyl, and Stephan Eichler, "Federation solutions for inter- and intradomain security in next-generation mobile service platforms," AEÜ - Journal of Electronics and Communications, vol. 60, no. 1, pp. 13-19, Jan. 2006.
    • (2006) AEÜ - Journal of Electronics and Communications , vol.60 , Issue.1 , pp. 13-19
    • Vögel, H.-J.1    Weyl, B.2    Eichler, S.3
  • 10
    • 0005314429 scopus 로고    scopus 로고
    • chapter The State of Cryptographic Hash Functions, pp, Springer-Verlag, Heidelberg
    • Bart Preneel, Lectures on Data Security: Modem Cryptology in Theory and Practice, vol. 1561, chapter The State of Cryptographic Hash Functions, pp. 158-182, Springer-Verlag, Heidelberg, 1999.
    • (1999) Lectures on Data Security: Modem Cryptology in Theory and Practice , vol.1561 , pp. 158-182
    • Preneel, B.1
  • 12
    • 0025479451 scopus 로고
    • Project athena as a distributed computer system
    • Sept
    • George A. Champine, Jr. Daniel E. Geer, and William N. Ruh, "Project athena as a distributed computer system," IEEE Computer Magazine, vol. 23, no. 9, pp. 40-51, Sept. 1990.
    • (1990) IEEE Computer Magazine , vol.23 , Issue.9 , pp. 40-51
    • Champine Jr., G.A.1    Geer, D.E.2    Ruh, W.N.3
  • 13
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • Sept
    • B. Clifford Neuman and Theodore Ts'o, "Kerberos: An authentication service for computer networks," IEEE Communications Magazine, vol. 32, no. 9, pp. 33-38, Sept. 1994.
    • (1994) IEEE Communications Magazine , vol.32 , Issue.9 , pp. 33-38
    • Clifford Neuman, B.1    Ts'o, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.