메뉴 건너뛰기




Volumn , Issue , 2008, Pages

A defense technique against misbehavior in VANETs based on threshold authentication

Author keywords

[No Author keywords available]

Indexed keywords

DEFENSE TECHNIQUES; USER PRIVACIES; VEHICULAR AD HOC NET WORKS;

EID: 62349086825     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MILCOM.2008.4753658     Document Type: Conference Paper
Times cited : (17)

References (19)
  • 2
    • 47949086407 scopus 로고    scopus 로고
    • An id-based framework achieving privacy and non-repudiation in vehicular ad hoc networks
    • Oct
    • J. Sun, C. Zhang, and Y. Fang, "An id-based framework achieving privacy and non-repudiation in vehicular ad hoc networks," Proc. IEEE Military Communications Conf., pp. 1-7, Oct. 2007.
    • (2007) Proc. IEEE Military Communications Conf , pp. 1-7
    • Sun, J.1    Zhang, C.2    Fang, Y.3
  • 3
    • 36749076982 scopus 로고    scopus 로고
    • GSIS: A secure and privacy-preserving protocol for vehicular communications
    • Nov
    • X. Lin, X. Sun, P.-H. Ho, and X. Shen, "GSIS: A secure and privacy-preserving protocol for vehicular communications," IEEE Trans. Vehicular Tech., vol. 56, no. 6, pp. 3442-3456, Nov. 2007.
    • (2007) IEEE Trans. Vehicular Tech , vol.56 , Issue.6 , pp. 3442-3456
    • Lin, X.1    Sun, X.2    Ho, P.-H.3    Shen, X.4
  • 6
    • 62349110871 scopus 로고    scopus 로고
    • IEEE Std 1609.2-2006, IEEE Trial-Use Standard for Wireless Access in Vehicular Environments? Security Services for Applications and Management Messages, http://ieeexplore.ieee.org/servlet/opac?punumber=11000, 2006.
    • IEEE Std 1609.2-2006, IEEE Trial-Use Standard for Wireless Access in Vehicular Environments? Security Services for Applications and Management Messages, http://ieeexplore.ieee.org/servlet/opac?punumber=11000, 2006.
  • 8
    • 35048839792 scopus 로고    scopus 로고
    • k-times anonymous authentication, ASIACRYPT 2004, Springer-Verlag
    • I. Teranisi, J. Furukawa, and K. Sako, "k-times anonymous authentication," ASIACRYPT 2004, Springer-Verlag, LNCS 3329, pp. 308-322, 2004.
    • (2004) LNCS , vol.3329 , pp. 308-322
    • Teranisi, I.1    Furukawa, J.2    Sako, K.3
  • 9
    • 0034588113 scopus 로고    scopus 로고
    • Power control and rate allocation in multirate wideband CDMA systems
    • Sept
    • J.W.Mark and S.Zhu, "Power control and rate allocation in multirate wideband CDMA systems," in Proc. IEEE Wireless Communications and Networking Conf., vol. 1, pp. 168-172, Sept. 2000.
    • (2000) Proc. IEEE Wireless Communications and Networking Conf , vol.1 , pp. 168-172
    • Mark, J.W.1    Zhu, S.2
  • 12
    • 84937428748 scopus 로고    scopus 로고
    • Dynamic accumulators and application to efficient revocation of anonymous credentials, CRYPTO 2002, Springer-Verlag
    • J. Camenisch and A. Lysyanskaya, "Dynamic accumulators and application to efficient revocation of anonymous credentials," CRYPTO 2002, Springer-Verlag, LNCS 2442, pp. 61-76, 2002.
    • (2002) LNCS , vol.2442 , pp. 61-76
    • Camenisch, J.1    Lysyanskaya, A.2
  • 13
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity-based signature schemes based on pairings
    • SAC, Springer-Verlag
    • F. Hess, Efficient identity-based signature schemes based on pairings, SAC 2002, LNCS 2595, pp. 310-324, Springer-Verlag, 2002.
    • (2002) LNCS , vol.2595 , pp. 310-324
    • Hess, F.1
  • 17
    • 33845597602 scopus 로고    scopus 로고
    • Position verification approaches for vehicular ad hoc networks
    • Oct
    • T. Leinmüller, E. Schoch, and F. Kargl, "Position verification approaches for vehicular ad hoc networks," IEEE Wireless Communications, pp. 16-21, Oct. 2006.
    • (2006) IEEE Wireless Communications , pp. 16-21
    • Leinmüller, T.1    Schoch, E.2    Kargl, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.