-
1
-
-
51349100301
-
-
Standard Specification for Telecommunications and Information Exchange Between Roadside and Vehicle Systems, 5 GHz Band Dedicated Short Range Communications (DSRC) Medium Access Control (MAC) and Physical Layer (PHY) Specifications. ASTM E2213-03, 2003
-
Standard Specification for Telecommunications and Information Exchange Between Roadside and Vehicle Systems - 5 GHz Band Dedicated Short Range Communications (DSRC) Medium Access Control (MAC) and Physical Layer (PHY) Specifications. ASTM E2213-03, 2003.
-
-
-
-
2
-
-
51349127252
-
-
IEEE P1609.2 Version 1 - Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages. In development, 2006.
-
IEEE P1609.2 Version 1 - Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages. In development, 2006.
-
-
-
-
3
-
-
34547318893
-
Crash risk assessment using intelligent transportation systems data and real-time intervention strategies to improve safety on freeways
-
Jul
-
M. Abdel-Aty, A. Pande, C. Lee, V. Gayah, and C. Dos Santos. Crash risk assessment using intelligent transportation systems data and real-time intervention strategies to improve safety on freeways. Journal of Intelligent Transportation Systems. 11 (3): 107-120, Jul. 2007.
-
(2007)
Journal of Intelligent Transportation Systems
, vol.11
, Issue.3
, pp. 107-120
-
-
Abdel-Aty, M.1
Pande, A.2
Lee, C.3
Gayah, V.4
Dos Santos, C.5
-
4
-
-
51349149829
-
-
S. Buchegger and J.-Y. Le Boudec. A robust reputation system for P2P and mobile ad-hoc networks. In Proceedings of P2PEcon '04, 2004.
-
S. Buchegger and J.-Y. Le Boudec. A robust reputation system for P2P and mobile ad-hoc networks. In Proceedings of P2PEcon '04, 2004.
-
-
-
-
5
-
-
30144440941
-
Dempster-Shafer Theory for intrusion detection in ad hoc networks
-
Nov.-Dec
-
T. M. Chen and V. Venkataramanan. Dempster-Shafer Theory for intrusion detection in ad hoc networks. IEEE Internet Computing, 9(6):35-41. Nov.-Dec. 2005.
-
(2005)
IEEE Internet Computing
, vol.9
, Issue.6
, pp. 35-41
-
-
Chen, T.M.1
Venkataramanan, V.2
-
6
-
-
33644864393
-
On the plausibility transformation method for translating belief function models to probability models
-
Apr
-
B. Cobb and P. Shenoy. On the plausibility transformation method for translating belief function models to probability models. International Journal of Appmximate Reasoning, 41(3):314-330, Apr. 2006.
-
(2006)
International Journal of Appmximate Reasoning
, vol.41
, Issue.3
, pp. 314-330
-
-
Cobb, B.1
Shenoy, P.2
-
8
-
-
14844315770
-
Reputation-based framework for high integrity sensor networks
-
S. Ganeriwal and M. Srivastava. Reputation-based framework for high integrity sensor networks. In Proceedings of SASN'04, 2004.
-
(2004)
Proceedings of SASN'04
-
-
Ganeriwal, S.1
Srivastava, M.2
-
11
-
-
0030735959
-
An introduction to multisensor data fusion
-
Jan
-
D.L. Hall and J. Llinas. An introduction to multisensor data fusion. Proceedings of the IEEE, 85(1):6-23, Jan. 1997.
-
(1997)
Proceedings of the IEEE
, vol.85
, Issue.1
, pp. 6-23
-
-
Hall, D.L.1
Llinas, J.2
-
12
-
-
39049164287
-
Trust evaluation in anarchy: A case study on autonomous networks
-
T. Jiang and J.S. Baras. Trust evaluation in anarchy: A case study on autonomous networks. In Proceedings of IEEE Infocom '06, 2006.
-
(2006)
Proceedings of IEEE Infocom '06
-
-
Jiang, T.1
Baras, J.S.2
-
13
-
-
36649033444
-
An algebra for assessing trust in certification chains
-
A. Jøsang. An algebra for assessing trust in certification chains. In Proceedings of NDSS'99, 1999.
-
(1999)
Proceedings of NDSS'99
-
-
Jøsang, A.1
-
16
-
-
84957803553
-
Confidence valuation in a public-key infrastructure based on uncertain evidence
-
Proceedings of PKC'00. of, Springer-Verlag
-
R. Kohlas and U. Maurer. Confidence valuation in a public-key infrastructure based on uncertain evidence. In Proceedings of PKC'00. volume 1751 of Lecture Notes in Computer Science, pages 93-112. Springer-Verlag. 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1751
, pp. 93-112
-
-
Kohlas, R.1
Maurer, U.2
-
17
-
-
0039015629
-
Authentication in distributed systems: Theory and practice
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: theory and practice. SIGOPS Oper. Syst. Rev., 25(5): 165-182, 1991.
-
(1991)
SIGOPS Oper. Syst. Rev
, vol.25
, Issue.5
, pp. 165-182
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
18
-
-
51349119100
-
-
J. Mundinger and J.-Y. Le Boudec. Reputation in self-organized communication systems and beyond. In Proceedings of Inter-Perf'06 (Invited Paper). 2006.
-
J. Mundinger and J.-Y. Le Boudec. Reputation in self-organized communication systems and beyond. In Proceedings of Inter-Perf'06 (Invited Paper). 2006.
-
-
-
-
19
-
-
34548179912
-
Enhancing the security of local danger warnings in VANETs - a simulative analysis of voting schemes
-
B. Ostermaier. F. Dotzer, and M. Strassberger. Enhancing the security of local danger warnings in VANETs - a simulative analysis of voting schemes. In Proceedings of ARES'07, 2007.
-
(2007)
Proceedings of ARES'07
-
-
Ostermaier, B.1
Dotzer, F.2
Strassberger, M.3
-
24
-
-
33144465932
-
-
Y. Sun, W. Yu. Z. Han, and K.J. Ray Liu. Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2):305-317, 2006.
-
Y. Sun, W. Yu. Z. Han, and K.J. Ray Liu. Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2):305-317, 2006.
-
-
-
|