-
1
-
-
33845726678
-
Securing vehicular ad hoc networks
-
M. Raya and J-P. Hubaux, "Securing vehicular ad hoc networks," Journal of Computer Security, Special Issue on Security of Ad Hoc and Sensor Networks, vol. 15, no. 1, pp. 39-68, 2007.
-
(2007)
Journal of Computer Security, Special Issue on Security of Ad Hoc and Sensor Networks
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.-P.2
-
2
-
-
47949086407
-
An id-based framework achieving privacy and non-repudiation in vehicular ad hoc networks
-
Oct
-
J. Sun, C. Zhang, and Y. Fang, "An id-based framework achieving privacy and non-repudiation in vehicular ad hoc networks," Proc. IEEE Military Communications Conf., pp. 1-7, Oct. 2007.
-
(2007)
Proc. IEEE Military Communications Conf
, pp. 1-7
-
-
Sun, J.1
Zhang, C.2
Fang, Y.3
-
3
-
-
36749076982
-
GSIS: A secure and privacy-preserving protocol for vehicular communications
-
Nov
-
X. Lin, X. Sun, P.-H. Ho, and X. Shen, "GSIS: A secure and privacy-preserving protocol for vehicular communications," IEEE Trans. Vehicular Tech., vol. 56, no. 6, pp. 3442-3456, Nov. 2007.
-
(2007)
IEEE Trans. Vehicular Tech
, vol.56
, Issue.6
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.-H.3
Shen, X.4
-
4
-
-
34247374798
-
An identity-based security framework for VANETs
-
Sept
-
P. Kamat, A. Baliga, and W. Trappe, "An identity-based security framework for VANETs," in Proc. 3rd ACM Int'l Workshop on Vehicular Ad Hoc Networks, VANET'06, pp. 94-95, Sept. 2006.
-
(2006)
Proc. 3rd ACM Int'l Workshop on Vehicular Ad Hoc Networks, VANET'06
, pp. 94-95
-
-
Kamat, P.1
Baliga, A.2
Trappe, W.3
-
5
-
-
77952377083
-
Black-listable anonymous credentials: Blocking misbehaving users without TTPs
-
P. Tsang, M. H. Au, A. Kapadia, and S. W. Smith, "Black-listable anonymous credentials: Blocking misbehaving users without TTPs," in ACM Conference on Computer and Communications Security, pp. 72-81, 2007.
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 72-81
-
-
Tsang, P.1
Au, M.H.2
Kapadia, A.3
Smith, S.W.4
-
6
-
-
62349110871
-
-
IEEE Std 1609.2-2006, IEEE Trial-Use Standard for Wireless Access in Vehicular Environments? Security Services for Applications and Management Messages, http://ieeexplore.ieee.org/servlet/opac?punumber=11000, 2006.
-
IEEE Std 1609.2-2006, IEEE Trial-Use Standard for Wireless Access in Vehicular Environments? Security Services for Applications and Management Messages, http://ieeexplore.ieee.org/servlet/opac?punumber=11000, 2006.
-
-
-
-
8
-
-
35048839792
-
k-times anonymous authentication, ASIACRYPT 2004, Springer-Verlag
-
I. Teranisi, J. Furukawa, and K. Sako, "k-times anonymous authentication," ASIACRYPT 2004, Springer-Verlag, LNCS 3329, pp. 308-322, 2004.
-
(2004)
LNCS
, vol.3329
, pp. 308-322
-
-
Teranisi, I.1
Furukawa, J.2
Sako, K.3
-
9
-
-
0034588113
-
Power control and rate allocation in multirate wideband CDMA systems
-
Sept
-
J.W.Mark and S.Zhu, "Power control and rate allocation in multirate wideband CDMA systems," in Proc. IEEE Wireless Communications and Networking Conf., vol. 1, pp. 168-172, Sept. 2000.
-
(2000)
Proc. IEEE Wireless Communications and Networking Conf
, vol.1
, pp. 168-172
-
-
Mark, J.W.1
Zhu, S.2
-
11
-
-
84944878354
-
-
Boca Raton, CRC Press
-
A. Menezes, P. V. Oorschot, and S. Vanston, Handbook of Applied Cryptography, Boca Raton, CRC Press, 1996.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Oorschot, P.V.2
Vanston, S.3
-
12
-
-
84937428748
-
Dynamic accumulators and application to efficient revocation of anonymous credentials, CRYPTO 2002, Springer-Verlag
-
J. Camenisch and A. Lysyanskaya, "Dynamic accumulators and application to efficient revocation of anonymous credentials," CRYPTO 2002, Springer-Verlag, LNCS 2442, pp. 61-76, 2002.
-
(2002)
LNCS
, vol.2442
, pp. 61-76
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
13
-
-
35248867510
-
Efficient identity-based signature schemes based on pairings
-
SAC, Springer-Verlag
-
F. Hess, Efficient identity-based signature schemes based on pairings, SAC 2002, LNCS 2595, pp. 310-324, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2595
, pp. 310-324
-
-
Hess, F.1
-
14
-
-
14944372809
-
Detecting and correcting malicious data in VANETs
-
Oct
-
P. Golle, D. Greene, and J. Staddon, "Detecting and correcting malicious data in VANETs," in Proc. 1st ACM Int'l Workshop on Vehicular Ad Hoc Networks, VANET'04, pp. 29-37, Oct. 2004.
-
(2004)
Proc. 1st ACM Int'l Workshop on Vehicular Ad Hoc Networks, VANET'04
, pp. 29-37
-
-
Golle, P.1
Greene, D.2
Staddon, J.3
-
15
-
-
14944347139
-
Performance evaluation of safety applications over DSRC vehicular ad hoc networks
-
Oct
-
J. Yin, T. Elbatt, G. Yeung, B. Ryu, S. Habermas, H. Krishnan, and T. Talty, "Performance evaluation of safety applications over DSRC vehicular ad hoc networks," in Proc. 1st ACM Int'l Workshop on Vehicular Ad Hoc Networks, VANET'04, Oct. 2004.
-
(2004)
Proc. 1st ACM Int'l Workshop on Vehicular Ad Hoc Networks, VANET'04
-
-
Yin, J.1
Elbatt, T.2
Yeung, G.3
Ryu, B.4
Habermas, S.5
Krishnan, H.6
Talty, T.7
-
16
-
-
34247376546
-
Improved security in geographic ad hoc routing through autonomous position verification
-
Sept
-
T. Leinmüller, C. Maihöfer, E. Schoch, and F. Kargl, "Improved security in geographic ad hoc routing through autonomous position verification," in Proc. 3rd ACM Int'l Workshop on Vehicular Ad Hoc Networks, VANET'06, Sept. 2006.
-
(2006)
Proc. 3rd ACM Int'l Workshop on Vehicular Ad Hoc Networks, VANET'06
-
-
Leinmüller, T.1
Maihöfer, C.2
Schoch, E.3
Kargl, F.4
-
17
-
-
33845597602
-
Position verification approaches for vehicular ad hoc networks
-
Oct
-
T. Leinmüller, E. Schoch, and F. Kargl, "Position verification approaches for vehicular ad hoc networks," IEEE Wireless Communications, pp. 16-21, Oct. 2006.
-
(2006)
IEEE Wireless Communications
, pp. 16-21
-
-
Leinmüller, T.1
Schoch, E.2
Kargl, F.3
-
18
-
-
34247336902
-
Efficient secure aggregation in VANETs
-
Sept
-
M. Raya, A. Aziz, and J. P. Hubaux, "Efficient secure aggregation in VANETs," in Proc. 3rd ACM Int'l Workshop on Vehicular Ad Hoc Networks, VANET'06, pp. 67-75, Sept. 2006.
-
(2006)
Proc. 3rd ACM Int'l Workshop on Vehicular Ad Hoc Networks, VANET'06
, pp. 67-75
-
-
Raya, M.1
Aziz, A.2
Hubaux, J.P.3
-
19
-
-
33750938846
-
Towards a security architecture for vehicular ad hoc networks
-
Apr
-
K. Plößl, T. Nowey, and C. Mletzko, "Towards a security architecture for vehicular ad hoc networks," in Proc. 1st Int'l Conf. on Availability, Reliability and Security, ARES'06, Apr. 2006.
-
(2006)
Proc. 1st Int'l Conf. on Availability, Reliability and Security, ARES'06
-
-
Plößl, K.1
Nowey, T.2
Mletzko, C.3
|