-
1
-
-
50449102534
-
-
A. Pfitzmann and M. Hansen, Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology, 0.28 ed., TU Dresden and ULD Kiel, May 2006. [Online]. Available: http://dud.inf.tu-dresden.de/Anon_Terminology.shtml
-
A. Pfitzmann and M. Hansen, Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology, 0.28 ed., TU Dresden and ULD Kiel, May 2006. [Online]. Available: http://dud.inf.tu-dresden.de/Anon_Terminology.shtml
-
-
-
-
2
-
-
33745957362
-
A multi-channel VANET providing concurrent safety and commercial services
-
New York, NY, USA: ACM Press
-
T. K. Mak, K. P. Laberteaux, and R. Sengupta, "A multi-channel VANET providing concurrent safety and commercial services," in Proceedings of the 2nd ACM International Workshop on Vehicular Ad Hoc Networks (VANET). New York, NY, USA: ACM Press, 2005, pp. 1-9.
-
(2005)
Proceedings of the 2nd ACM International Workshop on Vehicular Ad Hoc Networks (VANET)
, pp. 1-9
-
-
Mak, T.K.1
Laberteaux, K.P.2
Sengupta, R.3
-
3
-
-
33845739834
-
On providing security for an open telematics platform
-
June
-
S. Eichler, J. Billion, R. Maier, H.-J. Vögel, and R. Kroh, "On providing security for an open telematics platform," in Proceedings of the 5th International Conference on ITS Telecommunications, June 2005.
-
(2005)
Proceedings of the 5th International Conference on ITS Telecommunications
-
-
Eichler, S.1
Billion, J.2
Maier, R.3
Vögel, H.-J.4
Kroh, R.5
-
5
-
-
28844467073
-
Performance of PKI-based security mechanisms in mobile ad hoc networks
-
Jan
-
C. Schwingenschlögl, S. Eichler, and B. Müller-Rathgeber, "Performance of PKI-based security mechanisms in mobile ad hoc networks," AEÜ - Journal of Electronics and Communications, vol. 60, no. 1, pp. 20-24, Jan. 2006.
-
(2006)
AEÜ - Journal of Electronics and Communications
, vol.60
, Issue.1
, pp. 20-24
-
-
Schwingenschlögl, C.1
Eichler, S.2
Müller-Rathgeber, B.3
-
6
-
-
28844482553
-
Federation solutions for inter- and intradomain security in next-generation mobile service platforms
-
Jan
-
H.-J. Vögel, B. Weyl, and S. Eichler, "Federation solutions for inter- and intradomain security in next-generation mobile service platforms," AEÜ - Journal of Electronics and Communications, vol. 60, no. 1, pp. 13-19, Jan. 2006.
-
(2006)
AEÜ - Journal of Electronics and Communications
, vol.60
, Issue.1
, pp. 13-19
-
-
Vögel, H.-J.1
Weyl, B.2
Eichler, S.3
-
7
-
-
0030706923
-
Information security embedded in the design of telematics systems
-
O. Tettero, D. J. Out, H. M. Franken, and J. Schot, "Information security embedded in the design of telematics systems," Computers & Security, vol. 16, no. 2, pp. 145-164, 1997.
-
(1997)
Computers & Security
, vol.16
, Issue.2
, pp. 145-164
-
-
Tettero, O.1
Out, D.J.2
Franken, H.M.3
Schot, J.4
-
8
-
-
32144446861
-
Security issues in a future vehicular network
-
Feb
-
M. E. Zarki, S. Mehrotra, G. Tsudik, and N. Venkatasubramanian, "Security issues in a future vehicular network," in Proceedings of European Wireless, Next Generation Wireless Networks, vol. 1, Feb. 2002, pp. 270-274.
-
(2002)
Proceedings of European Wireless, Next Generation Wireless Networks
, vol.1
, pp. 270-274
-
-
Zarki, M.E.1
Mehrotra, S.2
Tsudik, G.3
Venkatasubramanian, N.4
-
9
-
-
0036992249
-
Framework for security and privacy in automotive telematics
-
ACM Press
-
S. Duri, M. Gruteser, X. Liu, P. Moskowitz, R. Perez, M. Singh, and J.-M. Tang, "Framework for security and privacy in automotive telematics," in Proceedings of the 2nd International Workshop on Mobile Commerce. ACM Press, 2002, pp. 25-32.
-
(2002)
Proceedings of the 2nd International Workshop on Mobile Commerce
, pp. 25-32
-
-
Duri, S.1
Gruteser, M.2
Liu, X.3
Moskowitz, P.4
Perez, R.5
Singh, M.6
Tang, J.-M.7
-
10
-
-
3042594839
-
The security and privacy of smart vehicles
-
May
-
J. P. Hubaux, S. Capkun, and J. Luo, "The security and privacy of smart vehicles," IEEE Security & Privacy, vol. 4, no. 3, pp. 49-55, May 2004.
-
(2004)
IEEE Security & Privacy
, vol.4
, Issue.3
, pp. 49-55
-
-
Hubaux, J.P.1
Capkun, S.2
Luo, J.3
-
12
-
-
84892591410
-
A survey of security issues in mobile ad hoc and sensor networks
-
D. Djenouri, L. Khelladi, and N. Badache, "A survey of security issues in mobile ad hoc and sensor networks," IEEE Communications Surveys & Tutorials, vol. 7, no. 4, pp. 2-28, 2005.
-
(2005)
IEEE Communications Surveys & Tutorials
, vol.7
, Issue.4
, pp. 2-28
-
-
Djenouri, D.1
Khelladi, L.2
Badache, N.3
-
14
-
-
33750938846
-
Towards a security architecture for vehicular ad hoc networks
-
K. Plößl, T. Nowey, and C. Mletzko, "Towards a security architecture for vehicular ad hoc networks," in Proceedings of The 1st International Conference on Availability, Reliability and Security (ARES), 2006, pp. 374-381.
-
(2006)
Proceedings of The 1st International Conference on Availability, Reliability and Security (ARES)
, pp. 374-381
-
-
Plößl, K.1
Nowey, T.2
Mletzko, C.3
-
15
-
-
33845564340
-
Securing vehicular communications
-
Oct
-
M. Raya, P. Papadimitratos, and J.-P. Hubaux, "Securing vehicular communications," IEEE Wireless Communications, vol. 13, no. 5, pp. 8-15, Oct. 2006.
-
(2006)
IEEE Wireless Communications
, vol.13
, Issue.5
, pp. 8-15
-
-
Raya, M.1
Papadimitratos, P.2
Hubaux, J.-P.3
|