메뉴 건너뛰기




Volumn , Issue , 2008, Pages 223-226

Key management in vehicular ad-hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; DIAGNOSTIC RADIOGRAPHY; ELECTRIC IMPEDANCE; ELECTRIC IMPEDANCE TOMOGRAPHY; INTELLIGENT VEHICLE HIGHWAY SYSTEMS; MEDICAL IMAGING; PUBLIC KEY CRYPTOGRAPHY; TELECOMMUNICATION NETWORKS;

EID: 51349142730     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/EIT.2008.4554301     Document Type: Conference Paper
Times cited : (11)

References (19)
  • 1
    • 33745948310 scopus 로고    scopus 로고
    • The Security of Vehicular Ad Hoc Networks, Maxim Raya and Jean-Pierre Hubaux, Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, 2005.
    • "The Security of Vehicular Ad Hoc Networks", Maxim Raya and Jean-Pierre Hubaux, Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, 2005.
  • 3
    • 35949003503 scopus 로고    scopus 로고
    • Vehicular Ad Hoc Networks and Dedicated Short-Range Communication
    • Jinhua Guo and Nathan Balon, September 22
    • "Vehicular Ad Hoc Networks and Dedicated Short-Range Communication", Jinhua Guo and Nathan Balon, September 22, 2006.
    • (2006)
  • 4
    • 0003507850 scopus 로고    scopus 로고
    • Network Security Essentials: Applications and Standards (Third Edition)
    • William Stallings
    • "Network Security Essentials: Applications and Standards (Third Edition)", William Stallings, 2007.
    • (2007)
  • 6
    • 51349141625 scopus 로고    scopus 로고
    • Guidelines for the Planning and Deployment of Emergency Vehicle Preemption and Transit Priority Strategies, Dr. John Collura, P.E., Dr. Hesham Rakha, Virginia Tech Transportation Institute (VTTI), Dr. Jonathan Gifford-George Mason University (GMU), January 2006.
    • "Guidelines for the Planning and Deployment of Emergency Vehicle Preemption and Transit Priority Strategies", Dr. John Collura, P.E., Dr. Hesham Rakha, Virginia Tech Transportation Institute (VTTI), Dr. Jonathan Gifford-George Mason University (GMU), January 2006.
  • 7
    • 51349158191 scopus 로고    scopus 로고
    • Key Management for Non-Tree Access Hierarchies, Mikhail J. Atallah, Marina Blanton, Keith B. Frikken, Department of Computer Science, Purdue University, 2006 ACM 1-59593-354-9/06/2006.
    • "Key Management for Non-Tree Access Hierarchies", Mikhail J. Atallah, Marina Blanton, Keith B. Frikken, Department of Computer Science, Purdue University, 2006 ACM 1-59593-354-9/06/2006.
  • 8
    • 51349098109 scopus 로고    scopus 로고
    • Location Dependent Key Management Using Random Key-predistribution in Sensor Networks, Farooq Anjum, Applied Research Telcordia Technology, Piscataway, NJ 08854, 2006 ACM 1-59593-557-6/06/0009.
    • "Location Dependent Key Management Using Random Key-predistribution in Sensor Networks", Farooq Anjum, Applied Research Telcordia Technology, Piscataway, NJ 08854, 2006 ACM 1-59593-557-6/06/0009.
  • 9
    • 51349103361 scopus 로고    scopus 로고
    • Use of Nested Certificates for Efficient Dynamic and Trust Preserving Public Key Infrastructure, Albert Levi Sabanci University, M. Ufuk Caglayan-Bogazici University, Cetin K. Koc-Oregon State University, 2004 ACM 1094-9224/04/0200-0021.
    • "Use of Nested Certificates for Efficient Dynamic and Trust Preserving Public Key Infrastructure", Albert Levi Sabanci University, M. Ufuk Caglayan-Bogazici University, Cetin K. Koc-Oregon State University, 2004 ACM 1094-9224/04/0200-0021.
  • 10
    • 51349093679 scopus 로고    scopus 로고
    • Reliable Group Rekeying: A Performance Analysis, Yang Richard Yang, X. Steve Li, X. Brian Zhang, Simon S. Lam, 2001 ACM 1-58113-411-08/01/ 0008.
    • "Reliable Group Rekeying: A Performance Analysis", Yang Richard Yang, X. Steve Li, X. Brian Zhang, Simon S. Lam, 2001 ACM 1-58113-411-08/01/ 0008.
  • 11
    • 51349154990 scopus 로고    scopus 로고
    • Nuttapong Attrapadung, Kazukini Kobara, Hideki Imai, ACM 1-58113-786-09/03/0010
    • "Broadcast Encryption with Short Keys and Transsmissions", Nuttapong Attrapadung, Kazukini Kobara, Hideki Imai, 2003 ACM 1-58113-786-09/03/0010.
    • (2003) Broadcast Encryption with Short Keys and Transsmissions
  • 12
    • 3142512728 scopus 로고    scopus 로고
    • Tree-Based Group Key Agreement, Yongdae Kim, Adrian Perrig, Gene Tsudik, February 2004 ACM Transaction on Information and System Security, 7, No. 1, pages 60-98.
    • "Tree-Based Group Key Agreement", Yongdae Kim, Adrian Perrig, Gene Tsudik, February 2004 ACM Transaction on Information and System Security, Vol. 7, No. 1, pages 60-98.
  • 15
    • 51349126655 scopus 로고    scopus 로고
    • Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung, ACM 1-58113-708-7/03/0007
    • "Scalable Public-Key Tracing and Revoking", Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung, 2003 ACM 1-58113-708-7/03/0007.
    • (2003) Scalable Public-Key Tracing and Revoking
  • 17
    • 0345565893 scopus 로고    scopus 로고
    • Sandro Rafaeli and David Hutchison, ACM 0360-0300/03/0900-0309, pp
    • "A Survey of Key Management for Secure Group Communication", Sandro Rafaeli and David Hutchison, 2003, ACM 0360-0300/03/0900-0309, pp. 309-329.
    • (2003) A Survey of Key Management for Secure Group Communication , pp. 309-329
  • 18
    • 51349104732 scopus 로고    scopus 로고
    • Towards Scalable and Reliable Group Key Management, Yang Richard Yang, Xiazhou Lil, Xincheng Zhang, Simon S. Lam, 2001 ACM 1-58113-334/01/01/06.
    • "Towards Scalable and Reliable Group Key Management", Yang Richard Yang, Xiazhou Lil, Xincheng Zhang, Simon S. Lam, 2001 ACM 1-58113-334/01/01/06.
  • 19
    • 0344984336 scopus 로고    scopus 로고
    • A Scalable Key-Management Scheme With Minimizing Key Storage for Secure Group Communication, Yuh-Min Tseng, 2003 John Wiley & Sons, Ltd., International J. Network Management, pp. 419-425.
    • "A Scalable Key-Management Scheme With Minimizing Key Storage for Secure Group Communication", Yuh-Min Tseng, 2003 John Wiley & Sons, Ltd., International J. Network Management, pp. 419-425.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.