-
2
-
-
58149140737
-
-
U.S. Department of Transportation, National Highway Traffic Safety Administration, Vehicle Safety Communications Project, Final Report, Apr. 2006.
-
"U.S. Department of Transportation, National Highway Traffic Safety Administration, Vehicle Safety Communications Project, Final Report", Apr. 2006.
-
-
-
-
3
-
-
33646690823
-
A security of vehicular ad hoc networks
-
Alexandria, VA, Nov
-
M. Raya and J.-R Hubaux, "A security of vehicular ad hoc networks", in Proc. SASN, Alexandria, VA, Nov. 2005.
-
(2005)
Proc. SASN
-
-
Raya, M.1
Hubaux, J.-R.2
-
5
-
-
36749076982
-
GSIS: A secure and privacypreserving protocol for vehicular communications
-
X. Lin, X. Sun, R-H. Ho, and X. Shen, "GSIS: a secure and privacypreserving protocol for vehicular communications", IEEE Trans. Veh. Technol., vol. 56, no. 6, pp. 3442-3456, 2007.
-
(2007)
IEEE Trans. Veh. Technol
, vol.56
, Issue.6
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, R.-H.3
Shen, X.4
-
6
-
-
34247336902
-
Efficient secure aggregation in VANETs
-
California, USA, Sept
-
M. Raya, A. Aziz and J.-R Hubaux, "Efficient secure aggregation in VANETs", in Proc. VANET, California, USA, Sept. 2006.
-
(2006)
Proc. VANET
-
-
Raya, M.1
Aziz, A.2
Hubaux, J.-R.3
-
7
-
-
0242426103
-
The TESLA broadcast authentication protocol
-
A. Perrig, R. Canneti, D. Song, and J. D. Tygar, "The TESLA broadcast authentication protocol", RSA Cryptobytes, vol. 5, no. 2, pp. 2-13, 2002.
-
(2002)
RSA Cryptobytes
, vol.5
, Issue.2
, pp. 2-13
-
-
Perrig, A.1
Canneti, R.2
Song, D.3
Tygar, J.D.4
-
8
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport, "Password authentication with insecure communication", Commun. of the ACM, vol. 24, no. 11, pp. 770-772, 1981.
-
(1981)
Commun. of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
9
-
-
84979076059
-
Pay Word and Micro Mint: Two simple micropayment schemes
-
Proc. SPW, Springer-Verlag, Berlin
-
R. Rivest and A. Shamir, "Pay Word and Micro Mint: two simple micropayment schemes", in Proc. SPW, LNCS, Springer-Verlag, vol. 1189, pp. 69-87. Berlin, 1996.
-
(1996)
LNCS
, vol.1189
, pp. 69-87
-
-
Rivest, R.1
Shamir, A.2
-
10
-
-
24144482746
-
Secure data forwarding in wireless ad hoc networks
-
Seoul, Korea, May
-
Q. Huang, I. Avramopoulos, B. Liu, and H. Kobayashi, "Secure data forwarding in wireless ad hoc networks", in Proc. ICC, Seoul, Korea, May 2005.
-
(2005)
Proc. ICC
-
-
Huang, Q.1
Avramopoulos, I.2
Liu, B.3
Kobayashi, H.4
-
11
-
-
85180799647
-
Authenticating streamed data in the presence of random packet loss
-
San Diego, California, USA, Feb
-
P. Golle and N. Modadugu, "Authenticating streamed data in the presence of random packet loss", in Proc. ISOC NDSS, San Diego, California, USA, Feb. 2001.
-
(2001)
Proc. ISOC NDSS
-
-
Golle, P.1
Modadugu, N.2
-
12
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, "Spins: security protocols for sensor networks", Wireless Networks, vol. 8, no. 11, pp. 521-534, 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.11
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
13
-
-
34250212592
-
A security architecture for faulttolerant systems
-
Ph.D. thesis, Department of Computer Science, Cornell University, Aug
-
M. Reiter, "A security architecture for faulttolerant systems", Ph.D. thesis, Department of Computer Science, Cornell University, Aug. 1993.
-
(1993)
-
-
Reiter, M.1
-
14
-
-
84976763336
-
A security architecture for fault-tolerant systems
-
Nov
-
M. Reiter, K. Birman, and R. van Renesse, "A security architecture for fault-tolerant systems", ACM Trans. Computer Syst., vol. 12, no. 4, pp. 340-371, Nov. 1994.
-
(1994)
ACM Trans. Computer Syst
, vol.12
, Issue.4
, pp. 340-371
-
-
Reiter, M.1
Birman, K.2
van Renesse, R.3
-
16
-
-
34047139459
-
Modeling the spread of worm epidemics in vehicular ad hoc networks
-
Montreal, Canada, Sept
-
M. Nekovee, "Modeling the spread of worm epidemics in vehicular ad hoc networks", in Proc. Veh. Technol. Conf., Montreal, Canada, Sept. 2006.
-
(2006)
Proc. Veh. Technol. Conf
-
-
Nekovee, M.1
-
17
-
-
0345134699
-
Comparison of delay estimates at under-saturated and over-saturated pre-timed signalized intersections
-
F. Dion, H. Rakha, and Y. kang, "Comparison of delay estimates at under-saturated and over-saturated pre-timed signalized intersections", Transportation Research Part B: Methodological, vol. 38, no. 2, pp. 99-122, 2004.
-
(2004)
Transportation Research Part B: Methodological
, vol.38
, Issue.2
, pp. 99-122
-
-
Dion, F.1
Rakha, H.2
kang, Y.3
-
18
-
-
36749002651
-
Data pouring and buffering on the road: A new data dissemination paradigm for vehicular ad hoc networks
-
J. Zhao, Y. Zhang, and G. Cao, "Data pouring and buffering on the road: a new data dissemination paradigm for vehicular ad hoc networks", IEEE Trans. Veh. Technol., vol. 56, no. 6, pp. 3266-3277, 2007.
-
(2007)
IEEE Trans. Veh. Technol
, vol.56
, Issue.6
, pp. 3266-3277
-
-
Zhao, J.1
Zhang, Y.2
Cao, G.3
-
19
-
-
34249106042
-
Incorporating uncertainty into the estimation of the passing sight distance requirements
-
J. E. Khoury and A. Hobeika, "Incorporating uncertainty into the estimation of the passing sight distance requirements", Computer-Aided Civil and Infrastructure Eng, vol. 22, no. 5, pp. 347-357, 2007.
-
(2007)
Computer-Aided Civil and Infrastructure Eng
, vol.22
, Issue.5
, pp. 347-357
-
-
Khoury, J.E.1
Hobeika, A.2
-
20
-
-
36749089541
-
Coordinated interaction using reliable broadcast in mobile wireless networks
-
Waterloo, Canada, May
-
T. L. Willke and N. F. Maxemchuk, "Coordinated interaction using reliable broadcast in mobile wireless networks", in Proc. Networking 2005, Waterloo, Canada, May 2005.
-
(2005)
Proc. Networking 2005
-
-
Willke, T.L.1
Maxemchuk, N.F.2
-
21
-
-
58149137529
-
LHAP: A lightweight hop-byhop authentication protocol for ad-hoc networks
-
May
-
S. Zhu, S. Xu, S. Setia, and S. Jajodia, "LHAP: a lightweight hop-byhop authentication protocol for ad-hoc networks", in Proc. MWN, May 2003.
-
(2003)
Proc. MWN
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
-
22
-
-
14944349351
-
Modeling mobility for vehicular ad hoc networks
-
Philadelphia, PA, USA, Oct
-
A. K. Saha and D. B. Johnson, "Modeling mobility for vehicular ad hoc networks", in Proc. VANET, Philadelphia, PA, USA, Oct. 2004.
-
(2004)
Proc. VANET
-
-
Saha, A.K.1
Johnson, D.B.2
-
23
-
-
36248988077
-
On broadcast authentication in wireless sensor networks
-
Nov
-
K. Ren, W. Lou, K. Zeng, and P. J. Moran, "On broadcast authentication in wireless sensor networks", IEEE Trans Wireless Commun., vol. 6, no. 11, pp. 4136-4144, Nov. 2007.
-
(2007)
IEEE Trans Wireless Commun
, vol.6
, Issue.11
, pp. 4136-4144
-
-
Ren, K.1
Lou, W.2
Zeng, K.3
Moran, P.J.4
-
24
-
-
36349017875
-
TTP based privacy preserving inter-WISP roaming architecture for wireless metropolitan area networks
-
Hong Kong, China, Mar
-
H. Zhu, X. Lin, P.-H. Ho, X. Shen, and M. Shi, "TTP based privacy preserving inter-WISP roaming architecture for wireless metropolitan area networks", in Proc. IEEE Wireless Commun. Networking Conf. (WCNC'07), Hong Kong, China, Mar. 2007.
-
(2007)
Proc. IEEE Wireless Commun. Networking Conf. (WCNC'07)
-
-
Zhu, H.1
Lin, X.2
Ho, P.-H.3
Shen, X.4
Shi, M.5
-
26
-
-
0003403663
-
-
Online, Available
-
The Network Simulator - ns-2. [Online]. Available: http://nsnam.isi.edu/ nsnam/index.php/User-Information.
-
The Network Simulator - ns-2
-
-
-
27
-
-
62949127465
-
IEEE Std 1609.2-2006, IEEE Trial-Use Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages
-
"IEEE Std 1609.2-2006, IEEE Trial-Use Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages", 2006.
-
(2006)
-
-
|