-
2
-
-
51249116196
-
-
U.S. Department of Transportation, National Highway Traffic Safety Adimistrtation, Vehicle Safety Communications Project, Apr
-
U.S. Department of Transportation, National Highway Traffic Safety Adimistrtation, Vehicle Safety Communications Project, Final Repot. Apr. 2006.
-
(2006)
Final Repot
-
-
-
3
-
-
37849009419
-
Secure incentives for commercial ad dissemination in vehicular networks
-
Montreal, Canada
-
S. Lee, G. Pan, J. Park, M. Gerla, and S. Lu, "Secure incentives for commercial ad dissemination in vehicular networks," in Processings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'07), Montreal, Canada, 2007.
-
(2007)
Processings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'07)
-
-
Lee, S.1
Pan, G.2
Park, J.3
Gerla, M.4
Lu, S.5
-
4
-
-
3042594839
-
The security and privacy of smart vehicles
-
J. P. Hubaux, S. Capkun, and J. Luo, "The security and privacy of smart vehicles," IEEE Security and Privacy Magazine, Vol. 2, No. 3, pp. 49-55, 2004.
-
(2004)
IEEE Security and Privacy Magazine
, vol.2
, Issue.3
, pp. 49-55
-
-
Hubaux, J.P.1
Capkun, S.2
Luo, J.3
-
5
-
-
33845726678
-
Securing vehicular ad hoc networks
-
M. Raya and J. P. Hubaux, "Securing vehicular ad hoc networks," Journal of Computer Security, Vol. 15, No. 1, pp. 39-68, 2007.
-
(2007)
Journal of Computer Security
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.P.2
-
6
-
-
36749076982
-
GSIS: A secure and privacy-preserving protocol for vehicular communications
-
X. Lin, X. Sun, P.-H. Ho, and X. Shen, "GSIS: a secure and privacy-preserving protocol for vehicular communications" IEEE Transaction on Vehicular Technology, Vol. 56, No. 6, pp. 3442-3456, 2007.
-
(2007)
IEEE Transaction on Vehicular Technology
, vol.56
, Issue.6
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.-H.3
Shen, X.4
-
7
-
-
51349156734
-
ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications
-
Phoenix, Arizona
-
R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, "ECPP: efficient conditional privacy preservation protocol for secure vehicular communications," in Processings of the IEEE International Conference on Computer Communications (INFOCOM'08), Phoenix, Arizona, 2008.
-
(2008)
Processings of the IEEE International Conference on Computer Communications (INFOCOM'08)
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Ho, P.-H.4
Shen, X.5
-
8
-
-
51449098979
-
An efficient identitybased batch verification scheme for vehicular sensor networks
-
Phoenix, Arizona
-
C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. Shen, "An efficient identitybased batch verification scheme for vehicular sensor networks," in Processings of the IEEE International Conference on Computer Communications (INFOCOM'08), Phoenix, Arizona, 2008.
-
(2008)
Processings of the IEEE International Conference on Computer Communications (INFOCOM'08)
-
-
Zhang, C.1
Lu, R.2
Lin, X.3
Ho, P.-H.4
Shen, X.5
-
9
-
-
66449131619
-
Mix zones for location privacy in vehicular networks
-
Vancouver, Canada, Aug
-
J. Freudiger, M. Raya, and M. Feleghhazi, "Mix zones for location privacy in vehicular networks," in Proncessings of the First International Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS '07), Vancouver, Canada, Aug. 2007.
-
(2007)
Proncessings of the First International Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS '07)
-
-
Freudiger, J.1
Raya, M.2
Feleghhazi, M.3
-
10
-
-
35349016950
-
AMOEBA: Robust location privacy scheme for VANET
-
Oct
-
K. Sampigethaya, Mi. Li, L. Huang, and R. Poovendran, "AMOEBA: robust location privacy scheme for VANET," IEEE Journal on Selected Areas in Communications (JSAC), Special issue on Vehicular Networks, Vol. 25, No. 8, pp. 1569-1589, Oct. 2007.
-
(2007)
IEEE Journal on Selected Areas in Communications (JSAC), Special issue on Vehicular Networks
, vol.25
, Issue.8
, pp. 1569-1589
-
-
Sampigethaya, K.1
Li, M.2
Huang, L.3
Poovendran, R.4
-
11
-
-
51249113175
-
-
IEEE Standard 1609.2 - IEEE Trial-Use Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages, July 2006.
-
IEEE Standard 1609.2 - IEEE Trial-Use Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages, July 2006.
-
-
-
-
12
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Transactions on Information Theory, Vol. 22, No, 5 pp. 644-654, 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, Issue.5
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
13
-
-
51249124823
-
-
Institute of Electrical and Electronics Engineers, Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications, ANSI/IEEE Std 802.3-1985, 1985.
-
Institute of Electrical and Electronics Engineers, "Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications," ANSI/IEEE Std 802.3-1985, 1985.
-
-
-
-
14
-
-
0036811662
-
K-ANONYMITY: A model for protecting privacy
-
L. Sweeney, "K-ANONYMITY: a model for protecting privacy," International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems, Vol. 10, No. 5, pp. 557-570, 2002.
-
(2002)
International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
15
-
-
35048887476
-
Short group signatures
-
Advances in Cryptology, of, Springer-Verlag
-
D. Boneh, X. Boyen, and H. Shacham, "Short group signatures," Advances in Cryptology , Vol. 3152 of LNCS, pp. 41-55, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
16
-
-
30744451685
-
Generating More MNT Elliptic Curves
-
Feb
-
M. Scott and P. S. L. M. Barreto. Generating More MNT Elliptic Curves. Designs, Codes and Cryptography, Vol. 38, No. 2, pp. 209-217, Feb. 2006.
-
(2006)
Designs, Codes and Cryptography
, vol.38
, Issue.2
, pp. 209-217
-
-
Scott, M.1
Barreto, P.S.L.M.2
-
17
-
-
50049123705
-
-
M. Scott, Implementing Cryptographic pairings. Pairing 2007, LCNS, 4575, pp. 177-196, Tokyo, Japan, July 2007.
-
M. Scott, Implementing Cryptographic pairings. Pairing 2007, LCNS, Vol. 4575, pp. 177-196, Tokyo, Japan, July 2007.
-
-
-
-
18
-
-
33745201299
-
-
Shamus Software, Online, Available
-
Shamus Software. MIRACL library, [Online]. Available: http://www.shamus.ie/index.php?page=Elliptic-Curve-point-multiplication.
-
MIRACL library
-
-
|