-
2
-
-
11244331261
-
Standard Specification for Telecommunications and Information Exchange Between Roadside and Vehicle Systems - 5 GHz Band Dedicated Short Range Communications (DSRC) Medium Access Control (MAC) and Physical Layer (PHY) Specifications. tma
-
ASTM E2213-03
-
ASTM E2213-03, Standard Specification for Telecommunications and Information Exchange Between Roadside and Vehicle Systems - 5 GHz Band Dedicated Short Range Communications (DSRC) Medium Access Control (MAC) and Physical Layer (PHY) Specifications. tma
-
-
-
-
3
-
-
27644488112
-
On the distribution and revocation of cryptographic keys in sensor networks
-
H. Chan, V. D. Gligor, A. Perrig, and G. Muralidharan, "On the distribution and revocation of cryptographic keys in sensor networks," IEEE Transactions on Dependable and Secure Computing, vol. 2, no. 3, pp. 233-247, 2005.
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.3
, pp. 233-247
-
-
Chan, H.1
Gligor, V.D.2
Perrig, A.3
Muralidharan, G.4
-
6
-
-
14944372809
-
Detecting and correcting malicious data in VANETs
-
P. Golle, D. Greene, and J. Staddon, "Detecting and correcting malicious data in VANETs," in 1st ACM International Workshop on Vehicular Ad hoc Networks (VANET), 2004, pp. 29-37.
-
(2004)
1st ACM International Workshop on Vehicular Ad hoc Networks (VANET)
, pp. 29-37
-
-
Golle, P.1
Greene, D.2
Staddon, J.3
-
7
-
-
0041291986
-
-
Internet Engineering Task Force RFC 3280
-
R. Housley, W. Polk, W. Ford, and D. Solo, "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile," Internet Engineering Task Force RFC 3280, 2002.
-
(2002)
Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
-
-
Housley, R.1
Polk, W.2
Ford, W.3
Solo, D.4
-
8
-
-
51749116100
-
-
IEEE Pl609.2 Version 1, Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages (in development).
-
IEEE Pl609.2 Version 1, Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages (in development).
-
-
-
-
9
-
-
0345755816
-
Adaptive security for multilevel ad hoc networks
-
J. Kong, H. Luo, K. Xu, D. Gu, M. Gerla, and S. Lu, "Adaptive security for multilevel ad hoc networks," Wireless Communications and Mobile Computing, vol. 2, no. 5, pp. 533-547, 2002.
-
(2002)
Wireless Communications and Mobile Computing
, vol.2
, Issue.5
, pp. 533-547
-
-
Kong, J.1
Luo, H.2
Xu, K.3
Gu, D.4
Gerla, M.5
Lu, S.6
-
10
-
-
34247376546
-
Improved security in geographic ad hoc routing through autonomous position verification
-
T. Leinmüller, C. Maihöfer, E. Schoch, and F. Kargl, "Improved security in geographic ad hoc routing through autonomous position verification," in 3rd ACM VANET, 2006, pp. 57-66.
-
(2006)
3rd ACM VANET
, pp. 57-66
-
-
Leinmüller, T.1
Maihöfer, C.2
Schoch, E.3
Kargl, F.4
-
11
-
-
38149015558
-
New strategies for revocation in ad-hoc networks
-
4th European Workshop on Security and Privacy in Ad-hoc and Sensor Networks ESAS, Springer
-
T. Moore, J. Clulow, S. Nagaraja, and R. Anderson, "New strategies for revocation in ad-hoc networks," in 4th European Workshop on Security and Privacy in Ad-hoc and Sensor Networks (ESAS), Springer Lecture Notes in Computer Science (LNCS), vol. 4572, pp. 232-246, 2007.
-
(2007)
Lecture Notes in Computer Science (LNCS
, vol.4572
, pp. 232-246
-
-
Moore, T.1
Clulow, J.2
Nagaraja, S.3
Anderson, R.4
-
13
-
-
37149046758
-
Securing vehicular communications - assumptions, requirements, and principles
-
P. Papadimitratos, V. Gligor, and J.-P. Hubaux, "Securing vehicular communications - assumptions, requirements, and principles," in Workshop on Embedded Security in Curs (escar'06), 2006.
-
(2006)
Workshop on Embedded Security in Curs (escar'06)
-
-
Papadimitratos, P.1
Gligor, V.2
Hubaux, J.-P.3
-
15
-
-
33745948310
-
The security of vehicular ad hoc networks
-
M. Raya and J.-P. Hubaux, "The security of vehicular ad hoc networks," in 3rd ACM SASN, 2005, pp. 11-21.
-
(2005)
3rd ACM SASN
, pp. 11-21
-
-
Raya, M.1
Hubaux, J.-P.2
-
16
-
-
35348977820
-
Eviction of misbehaving and faulty nodes in vehicular networks
-
M. Raya, P. Papadimitratos, I. Aad, D. Jungels, J.-P. Hubaux, "Eviction of misbehaving and faulty nodes in vehicular networks," IEEE Journal on Selected Areas in Communication, vol. 25, no. 8, pp. 1557-68, 2007.
-
(2007)
IEEE Journal on Selected Areas in Communication
, vol.25
, Issue.8
, pp. 1557-1568
-
-
Raya, M.1
Papadimitratos, P.2
Aad, I.3
Jungels, D.4
Hubaux, J.-P.5
-
17
-
-
14944349351
-
Modeling mobility for vehicular ad-hoc networks
-
A. Saha and D. Johnson, "Modeling mobility for vehicular ad-hoc networks," in 1st ACM VANET, 2004, pp. 91-92.
-
(2004)
1st ACM VANET
, pp. 91-92
-
-
Saha, A.1
Johnson, D.2
-
18
-
-
51749094731
-
-
Security of Vehicular NetworksOEPFL
-
Security of Vehicular NetworksOEPFL, http://ivc.epfl.ch
-
-
-
-
19
-
-
51749110568
-
-
Vehicle Safety Communications Project
-
Vehicle Safety Communications Project, http://www-nrd.nhtsa.dot.gov/pdf/ nrd-12/CAMP3/pages/VSCC.htm
-
-
-
-
20
-
-
32144446861
-
Security issues in a future vehicular network
-
M. E. Zarki, S. Mehrotra, G. Tsudik, and N. Venkatasubramanian, "Security issues in a future vehicular network," in European Wireless, 2002.
-
(2002)
European Wireless
-
-
Zarki, M.E.1
Mehrotra, S.2
Tsudik, G.3
Venkatasubramanian, N.4
-
21
-
-
0033357103
-
Securing ad hoc networks
-
L. Zhou and Z. Haas, "Securing ad hoc networks," IEEE Network, vol. 13, no. 6, pp. 24-30, 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.2
|