-
1
-
-
57449105235
-
Secure vehicular communications: Design and architecture
-
November
-
P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung, and J.-P. Hubaux, "Secure vehicular communications: Design and architecture," IEEE Communications Magazine, vol. 46, no. 11, pp. 100-109, November 2008.
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.11
, pp. 100-109
-
-
Papadimitratos, P.1
Buttyan, L.2
Holczer, T.3
Schoch, E.4
Freudiger, J.5
Raya, M.6
Ma, Z.7
Kargl, F.8
Kung, A.9
Hubaux, J.-P.10
-
4
-
-
84937564790
-
Anonymity, unobservability, and pseudonymity - a proposal for terminology
-
A. Pfitzmann and M. Köhntopp, "Anonymity, unobservability, and pseudonymity - a proposal for terminology." in Workshop on Design Issues in Anonymity and Unobservability, 2000, pp. 1-9.
-
(2000)
Workshop on Design Issues in Anonymity and Unobservability
, pp. 1-9
-
-
Pfitzmann, A.1
Köhntopp, M.2
-
7
-
-
3242815149
-
Towards measuring anonymity
-
C. Diaz, S. Seys, J. Claessens, and B. Preneel, "Towards measuring anonymity," in Workshop on Privacy Enhancing Technologies, 2002.
-
(2002)
Workshop on Privacy Enhancing Technologies
-
-
Diaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
8
-
-
2942524994
-
Location privacy in pervasive computing
-
A. R. Beresford and F. Stajano, "Location privacy in pervasive computing," IEEE Pervasive Computing, vol. 2, no. 1, pp. 46-55, 2003.
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.1
, pp. 46-55
-
-
Beresford, A.R.1
Stajano, F.2
-
9
-
-
58149134080
-
On the effectiveness of changing pseudonyms to provide location privacy in VANETs
-
July
-
L. Buttyan, T. Holczer, and I. Vajda, "On the effectiveness of changing pseudonyms to provide location privacy in VANETs," in ESAS 2007, July 2007.
-
(2007)
ESAS 2007
-
-
Buttyan, L.1
Holczer, T.2
Vajda, I.3
-
10
-
-
58149131713
-
Mix-zones for location privacy in vehicular networks
-
J. Freudiger, M. Raya, M. Felegyhazi, P. Papadimitratos, and J.-P. Hubaux, "Mix-zones for location privacy in vehicular networks," in WiN-ITS, 2007.
-
(2007)
WiN-ITS
-
-
Freudiger, J.1
Raya, M.2
Felegyhazi, M.3
Papadimitratos, P.4
Hubaux, J.-P.5
-
11
-
-
24644488889
-
On the anonymity of periodic location samples
-
M. Gruteser and B. Hoh, "On the anonymity of periodic location samples." in Security in Pervasive Computing 2005, Boppard, Germany, vol. 3450, 2005, pp. 179-192.
-
(2005)
Security in Pervasive Computing 2005, Boppard, Germany
, vol.3450
, pp. 179-192
-
-
Gruteser, M.1
Hoh, B.2
-
12
-
-
57049149967
-
Caravan: Providing location privacy for vanet
-
Nov
-
K. Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K. Sezaki, "Caravan: Providing location privacy for vanet," in Proceedings of Embedded Security in Cars (ESCAR), Nov. 2005.
-
(2005)
Proceedings of Embedded Security in Cars (ESCAR)
-
-
Sampigethaya, K.1
Huang, L.2
Li, M.3
Poovendran, R.4
Matsuura, K.5
Sezaki, K.6
-
13
-
-
57349108972
-
Preserving privacy in GPS traces via density-aware path cloaking
-
B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, "Preserving privacy in GPS traces via density-aware path cloaking," in ACM Conference on Computer and Communications Security (CCS), 2007.
-
(2007)
ACM Conference on Computer and Communications Security (CCS)
-
-
Hoh, B.1
Gruteser, M.2
Xiong, H.3
Alrabady, A.4
-
14
-
-
70349257237
-
Measuring unlinkability revisited
-
Alexandria, Virginia, October 27
-
L. Fischer, S. Katzenbeisser, and C. Eckert, "Measuring unlinkability revisited," in WPES '08: Proceedings of the 7th ACM workshop on Privacy in the electronic society, Alexandria, Virginia, October 27 2008.
-
(2008)
WPES '08: Proceedings of the 7th ACM workshop on Privacy in the electronic society
-
-
Fischer, L.1
Katzenbeisser, S.2
Eckert, C.3
-
15
-
-
0003461406
-
Towards a better understanding of context and context-awareness
-
The Hague, The Netherlands, April
-
A. Dey and G. Abowd, "Towards a better understanding of context and context-awareness," in Workshop on The What, Who, Where, When, and How of Context-Awareness, The Hague, The Netherlands, April 2000.
-
(2000)
Workshop on The What, Who, Where, When, and How of Context-Awareness
-
-
Dey, A.1
Abowd, G.2
-
17
-
-
38049035427
-
Inference attacks on location tracks
-
Toronto, Canada, May
-
J. Krumm, "Inference attacks on location tracks," in Fifth International Conference on Pervasive Computing, Toronto, Canada, May 2007, pp. 127-143.
-
(2007)
Fifth International Conference on Pervasive Computing
, pp. 127-143
-
-
Krumm, J.1
-
18
-
-
67650687281
-
Pseudonym-on-demand: A new pseudonym refill strategy for vehicular communications
-
Calgary, Canada, September
-
Z. Ma, F. Kargl, and M. Weber, "Pseudonym-on-demand: a new pseudonym refill strategy for vehicular communications," in WiVeC 2008, Calgary, Canada, September 2008.
-
(2008)
WiVeC 2008
-
-
Ma, Z.1
Kargl, F.2
Weber, M.3
-
19
-
-
84856043672
-
A mathematical theory of communication
-
July, October
-
C. E. Shannon, "A mathematical theory of communication," Bell system technical journal, vol. 27, pp. 379-423, 623-656, July, October 1948.
-
(1948)
Bell system technical journal
, vol.27
-
-
Shannon, C.E.1
-
20
-
-
33750879264
-
Enhancing security and privacy in traffic-monitoring systems
-
B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, "Enhancing security and privacy in traffic-monitoring systems," IEEE Pervasive Computing, vol. 5, no. 4, pp. 38-46, 2006.
-
(2006)
IEEE Pervasive Computing
, vol.5
, Issue.4
, pp. 38-46
-
-
Hoh, B.1
Gruteser, M.2
Xiong, H.3
Alrabady, A.4
|