메뉴 건너뛰기




Volumn , Issue , 2008, Pages 2800-2804

Trust issues for vehicular ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

IMAGE COMPRESSION; INTELLIGENT VEHICLE HIGHWAY SYSTEMS; MOBILE AD HOC NETWORKS; MOBILE TELECOMMUNICATION SYSTEMS; REAL TIME SYSTEMS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 47749147333     PISSN: 15502252     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/VETECS.2008.611     Document Type: Conference Paper
Times cited : (101)

References (20)
  • 4
    • 0012408597 scopus 로고    scopus 로고
    • SDSI - A simple distributed security infrastructure
    • Presented at
    • R. L. Rivest and B. Lampson, "SDSI - A simple distributed security infrastructure." Presented at CRYPTO'96 Rumpsession, 1996.
    • (1996) CRYPTO'96 Rumpsession
    • Rivest, R.L.1    Lampson, B.2
  • 12
    • 85024290278 scopus 로고
    • Group signatures
    • Online, Available
    • D. Chaum and E. van Heyst, "Group signatures," Lecture Notes of Computer Science, vol. 547, 1991. [Online]. Available: http://link.springer-ny.com/link/service/series/0558/papers/0547/05470257.pdf
    • (1991) Lecture Notes of Computer Science , vol.547
    • Chaum, D.1    van Heyst, E.2
  • 13
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret," Commun. ACM. vol. 22. no. 11, pp. 612-613, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 15
    • 0037885580 scopus 로고    scopus 로고
    • Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks
    • Canary Islands, Spain: IEEE Computer Society, January, Online, Available
    • S. Buchegger and J.-Y. L. Boudec, "Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks," in Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing. Canary Islands, Spain: IEEE Computer Society, January 2002, pp. 403-410. [Online]. Available: citeseer.ist.psu.edu/article/ buchegger02nodes.html
    • (2002) Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing , pp. 403-410
    • Buchegger, S.1    Boudec, J.-Y.L.2
  • 16
    • 47749128826 scopus 로고    scopus 로고
    • L. Buttyán and J. Hubaux, Nuglets: a virtual currency to stimulate cooperation in self-organized ad hoc networks, EPFL, Tech. Rep., 2001. [Online]. Available: citeseer.ist.psu.edu/article/buttyan01nuglets.html
    • L. Buttyán and J. Hubaux, "Nuglets: a virtual currency to stimulate cooperation in self-organized ad hoc networks," EPFL, Tech. Rep., 2001. [Online]. Available: citeseer.ist.psu.edu/article/buttyan01nuglets.html
  • 17
    • 47749088195 scopus 로고    scopus 로고
    • How to design wireless security mechanisms
    • Ruhr University Bochum, Germany, december 2002, Online, Available
    • M. G. Zapata, "How to design wireless security mechanisms," in Proceedings of Workshop on Security in Ad-Hoc Networks. Ruhr University Bochum, Germany, december 2002. [Online]. Available: www.crypto.rub.de/adhocsec/ Abs_Zapata.pdf
    • Proceedings of Workshop on Security in Ad-Hoc Networks
    • Zapata, M.G.1
  • 18
    • 0042933944 scopus 로고    scopus 로고
    • Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
    • San Fransisco, CA, april 2003, Online, Available
    • S. Zhong, J. Chen, and Y. Yang, "Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks," in Proceedings of IEEE Infocom, San Fransisco, CA, april 2003. [Online]. Available: gunther.smeal.psu.edu/15502.html
    • Proceedings of IEEE Infocom
    • Zhong, S.1    Chen, J.2    Yang, Y.3
  • 19
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • Online, Available
    • F. Stajano and R. Anderson, "The resurrecting duckling: Security issues for ad-hoc wireless networks," in Security Protocols, 7th International Workshop Proceedings, 1999. pp. 172-194. [Online]. Available: citeseer.ist.psu.edu/article/stajano99resurrecting.html
    • (1999) Security Protocols, 7th International Workshop Proceedings , pp. 172-194
    • Stajano, F.1    Anderson, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.