-
1
-
-
33745948310
-
The security of vehicular ad hoc networks
-
York, NY, USA: ACM
-
M. Raya and J,-P. Hubaux, "The security of vehicular ad hoc networks," in SASN '05: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks. New York, NY, USA: ACM, 2005, pp. 11-21.
-
(2005)
SASN '05: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks. New
, pp. 11-21
-
-
Raya, M.1
Hubaux, J.-P.2
-
2
-
-
47349128749
-
Privacy and identity management for vehicular communication systems: A position paper
-
P. Papadimitratos, A. Kung, J.-P. Hubaux, and F. Kargl, "Privacy and identity management for vehicular communication systems: a position paper," in Workshop on Standards for Privacy in User-Centric Identity Management, 2006.
-
(2006)
Workshop on Standards for Privacy in User-Centric Identity Management
-
-
Papadimitratos, P.1
Kung, A.2
Hubaux, J.-P.3
Kargl, F.4
-
3
-
-
33845726678
-
Securing vehicular ad hoc networks
-
M. Raya and J.-P. Hubaux, "Securing vehicular ad hoc networks," Journal of Computer Security, vol, 15, no. 1, pp. 39-68, 2007.
-
(2007)
Journal of Computer Security
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.-P.2
-
4
-
-
57049149967
-
Caravan: Providing location privacy for vanet
-
K. Sampigethaya, L. Huang, K. Matsuura, R. Poovendran, and K, Sezaki, "Caravan: Providing location privacy for vanet," in Escar 2005: 3rd Embedded Security in Cars Workshop, 2005.
-
(2005)
Escar 2005: 3rd Embedded Security in Cars Workshop
-
-
Sampigethaya, K.1
Huang, L.2
Matsuura, K.3
Poovendran, R.4
Sezaki, K.5
-
5
-
-
1342281463
-
The threat of intelligent collisions
-
Jan.-Feb
-
J. Blum and A. Eskandarian, "The threat of intelligent collisions," IT Professional, vol. 6, no. 1, pp. 24-29, Jan.-Feb. 2004.
-
(2004)
IT Professional
, vol.6
, Issue.1
, pp. 24-29
-
-
Blum, J.1
Eskandarian, A.2
-
6
-
-
33845753044
-
Challenges in securing vehicular networks
-
Online, Available
-
B, Parno and A. Perrig, "Challenges in securing vehicular networks," Workshop on Hot Topics in Networks (HotNets-IV), 2005. [Online]. Available: http://sparrow.ece.cmu.edu/ parno/pubs/vehicles.pdf
-
(2005)
Workshop on Hot Topics in Networks (HotNets-IV)
-
-
Parno, B.1
Perrig, A.2
-
7
-
-
37149046758
-
Securing Vehicular Communications - Assumptions, Requirements, and Principles
-
P. Papadimitratos, V. Gligor, and J. Hubaux, "Securing Vehicular Communications - Assumptions, Requirements, and Principles," in Workshop on Embedded Security in Cars (ESCAR) 2006, 2006.
-
(2006)
Workshop on Embedded Security in Cars (ESCAR) 2006
-
-
Papadimitratos, P.1
Gligor, V.2
Hubaux, J.3
-
8
-
-
32144450457
-
Balancing auditability and privacy in vehicular networks
-
New York, NY, USA: ACM
-
J. Y. Choi, M. Jakobsson, and S. Wetzel, "Balancing auditability and privacy in vehicular networks," in Q2SWinet '05: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks. New York, NY, USA: ACM, 2005, pp. 79-87.
-
(2005)
Q2SWinet '05: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
, pp. 79-87
-
-
Choi, J.Y.1
Jakobsson, M.2
Wetzel, S.3
-
9
-
-
47949086407
-
An id-based framework achieving privacy and non-repudiation in vehicular ad hoc networks
-
29-31 Oct
-
J. Sun, C. Zhang, and Y. Fang, "An id-based framework achieving privacy and non-repudiation in vehicular ad hoc networks," Military Communications Conference, 2007. MILCOM 2007. IEEE, pp. 1-7, 29-31 Oct. 2007.
-
(2007)
Military Communications Conference, 2007. MILCOM 2007. IEEE
, pp. 1-7
-
-
Sun, J.1
Zhang, C.2
Fang, Y.3
-
12
-
-
34247336902
-
Efficient secure aggregation in vanets
-
New York, NY, USA: ACM
-
M. Raya, A. Aziz, and J.-P. Hubaux, "Efficient secure aggregation in vanets," in VANET '06: Proceedings of the 3rd international workshop on Vehicular ad hoc networks. New York, NY, USA: ACM, 2006, pp. 67-75.
-
(2006)
VANET '06: Proceedings of the 3rd international workshop on Vehicular ad hoc networks
, pp. 67-75
-
-
Raya, M.1
Aziz, A.2
Hubaux, J.-P.3
-
13
-
-
46749114124
-
A novel secure communication scheme in vehicular ad hoc networks
-
N.-W. Wang, Y-M. Huang, and W.-M. Chen, "A novel secure communication scheme in vehicular ad hoc networks," Computer Communications, Elsevier, 2008.
-
(2008)
Computer Communications, Elsevier
-
-
Wang, N.-W.1
Huang, Y.-M.2
Chen, W.-M.3
-
14
-
-
0017018484
-
New directions in cryptography
-
Online, Available
-
W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Transactions on Information Theory, vol. IT-22, no. 6, pp. 644-654, 1976. [Online]. Available: citeseer.ist.psu.edu/diffie76new.html
-
(1976)
IEEE Transactions on Information Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
16
-
-
35348977820
-
Eviction of misbehaving and faulty nodes in vehicular networks
-
Oct
-
M. Raya, P Papadimitratos, I. Aad, D. Jungels, and J.-P. Hubaux, "Eviction of misbehaving and faulty nodes in vehicular networks," Selected Areas in Communications, IEEE Journal on, vol. 25, no. 8, pp. 1557-1568, Oct. 2007.
-
(2007)
Selected Areas in Communications, IEEE Journal on
, vol.25
, Issue.8
, pp. 1557-1568
-
-
Raya, M.1
Papadimitratos, P.2
Aad, I.3
Jungels, D.4
Hubaux, J.-P.5
-
17
-
-
38149010558
-
On the effectiveness of changing pseudonyms to provide location privacy in vanets
-
L. Buttyán, T. Holczer, and I. Vajda, "On the effectiveness of changing pseudonyms to provide location privacy in vanets," in ESAS, 2007, pp. 129-141.
-
(2007)
ESAS
, pp. 129-141
-
-
Buttyán, L.1
Holczer, T.2
Vajda, I.3
-
18
-
-
24944489750
-
Enhancing wireless location privacy using silent period
-
2, 13-17 March
-
L. Huang, K. Matsuura, H. Yamane, and K. Sezaki, "Enhancing wireless location privacy using silent period," Wireless Communications and Networking Conference, 2005 IEEE, vol. 2. pp. 1187-1192 Vol. 2, 13-17 March 2005.
-
(2005)
Wireless Communications and Networking Conference, 2005 IEEE
, vol.2
, pp. 1187-1192
-
-
Huang, L.1
Matsuura, K.2
Yamane, H.3
Sezaki, K.4
-
19
-
-
85032883059
-
A public key cryptosystetn and a signature scheme based on discrete logarithms
-
New York, NY, USA: Springer-Verlag New York, Inc
-
T. E. Gamal, "A public key cryptosystetn and a signature scheme based on discrete logarithms," in Proceedings of CRYPTO 84 on Advances in cryptology. New York, NY, USA: Springer-Verlag New York, Inc., 1985, pp. 10-18.
-
(1985)
Proceedings of CRYPTO 84 on Advances in cryptology
, pp. 10-18
-
-
Gamal, T.E.1
|