메뉴 건너뛰기




Volumn , Issue , 2008, Pages

Service discovery and service access in wireless vehicular networks

Author keywords

Security; Service discovery; Service provisioning; Wireless vehicular networks

Indexed keywords

INFORMATION SERVICES;

EID: 62949186729     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOMW.2008.ECP.54     Document Type: Conference Paper
Times cited : (7)

References (19)
  • 1
    • 62949105503 scopus 로고    scopus 로고
    • DOT HS 809 859 nhtsa. Vehicle Safety Communications Project Task 3 Final Report. Identify Intelligent Vehicle Safety Applications Enabled by DSRC. March, 2005.
    • DOT HS 809 859 nhtsa. Vehicle Safety Communications Project Task 3 Final Report. Identify Intelligent Vehicle Safety Applications Enabled by DSRC. March, 2005.
  • 2
    • 58149116703 scopus 로고    scopus 로고
    • Privacy and Identity Management for Vehicular Communication System
    • Papadimitratos, P., Kung, A., Hubaux, J. and Kargl, F. "Privacy and Identity Management for Vehicular Communication System". eSafety, 2005.
    • (2005) eSafety
    • Papadimitratos, P.1    Kung, A.2    Hubaux, J.3    Kargl, F.4
  • 3
    • 11244290742 scopus 로고    scopus 로고
    • Secure and Privacy- Preserving Communication in Hybrid Ad Hoc Networks
    • Capkun S., Hubaux, J. and Jakobsson M. 'Secure and Privacy- Preserving Communication in Hybrid Ad Hoc Networks'. EPFL-ICTechnical Report, 2004.
    • (2004) EPFL-ICTechnical Report
    • Capkun, S.1    Hubaux, J.2    Jakobsson, M.3
  • 4
    • 62949084263 scopus 로고    scopus 로고
    • Mishra, A. and Nadkarni, K. Security in Wireless Ad Hoc Networks. The Handbook of Wireless Networks, Chap. 3. M. Ilyas, 2003.
    • Mishra, A. and Nadkarni, K. "Security in Wireless Ad Hoc Networks". The Handbook of Wireless Networks, Chap. 3. M. Ilyas, 2003.
  • 5
    • 62949198757 scopus 로고    scopus 로고
    • Zhou, D. Security Issues in Ad Hoc Networks. The Handbook of Wireless Networks, Chap. 32. M. Ilyas, 2003.
    • Zhou, D. "Security Issues in Ad Hoc Networks". The Handbook of Wireless Networks, Chap. 32. M. Ilyas, 2003.
  • 7
    • 1342281463 scopus 로고    scopus 로고
    • The Threat of Intelligent Collisions
    • IEEE Computer Society, Feb
    • Blum J. and Eskandarian, A. "The Threat of Intelligent Collisions". IT Pro, IEEE Computer Society, Feb. 2004.
    • (2004) IT Pro
    • Blum, J.1    Eskandarian, A.2
  • 8
    • 62949177263 scopus 로고    scopus 로고
    • Housley, R. and Aboba, B. RFC 4962, 'Guidance for Authentication, Authorization and Accounting (AAA) Key Management', NetworkWorking Group, IETF Trust, 2007.
    • Housley, R. and Aboba, B. RFC 4962, 'Guidance for Authentication, Authorization and Accounting (AAA) Key Management', NetworkWorking Group, IETF Trust, 2007.
  • 10
    • 62949205691 scopus 로고    scopus 로고
    • tm- 2007.
    • tm- 2007.
  • 12
    • 62949153877 scopus 로고    scopus 로고
    • Raya, M. and Hubaux, J. 'The Security of Vanet'. ACM SASN'05, USA. 2005.
    • Raya, M. and Hubaux, J. 'The Security of Vanet'. ACM SASN'05, USA. 2005.
  • 14
    • 62949191210 scopus 로고    scopus 로고
    • Coronado, E. and Cherkaoui, S. 'Secure service provisioning in vehicular networks', UBIROADS'07, Morocco, 2007.
    • Coronado, E. and Cherkaoui, S. 'Secure service provisioning in vehicular networks', UBIROADS'07, Morocco, 2007.
  • 15
    • 62949146482 scopus 로고    scopus 로고
    • Housley, R., Polk, W., Ford, W. and Solo, D. RFC 3280. 'Internet X.509 Public Key Infrastructure Certificate and Certificate RevocationList (CRL) Profile'. Network Working Group. Internet Society, 2002.
    • Housley, R., Polk, W., Ford, W. and Solo, D. RFC 3280. 'Internet X.509 Public Key Infrastructure Certificate and Certificate RevocationList (CRL) Profile'. Network Working Group. Internet Society, 2002.
  • 16
    • 0042660545 scopus 로고    scopus 로고
    • Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks'. Kluwer
    • pag
    • Buttyan, L. and Hubaux, J. 'Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks'. Kluwer. Mobile Networks and applications 8, pag. 579-595, 2003.
    • (2003) Mobile Networks and applications , vol.8 , pp. 579-595
    • Buttyan, L.1    Hubaux, J.2
  • 17
    • 84954161437 scopus 로고    scopus 로고
    • Enforcing Service Availability in Mobile Ad-Hoc WANs
    • Buttyan, L. and Hubaux, J. 'Enforcing Service Availability in Mobile Ad-Hoc WANs'. EPFL-DSC-ICA, 2000.
    • (2000) EPFL-DSC-ICA
    • Buttyan, L.1    Hubaux, J.2
  • 18
    • 47249138517 scopus 로고    scopus 로고
    • A Survey of Existing Approaches for Secure Ad Hoc Routing and Their Applicability to VANETs
    • Fonseca, E. and Festag, A. 'A Survey of Existing Approaches for Secure Ad Hoc Routing and Their Applicability to VANETs'. NEC Network Laboratories, 2006.
    • (2006) NEC Network Laboratories
    • Fonseca, E.1    Festag, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.