-
2
-
-
31344435929
-
Cryptographic processorsa survey
-
Anderson R., Bond M., Clulow J., Skorobogatov S., Cryptographic processorsa survey Proceedings of the IEEE 2006 94 2 357 369
-
(2006)
Proceedings of the IEEE
, vol.94
, Issue.2
, pp. 357-369
-
-
Anderson, R.1
Bond, M.2
Clulow, J.3
Skorobogatov, S.4
-
3
-
-
84954456621
-
-
Proceedings of the 2nd USENIX Workshop on Electronic Commerce November 1996 Oakland, Calif, USA
-
Anderson R., Kuhn M., Tamper resistance: a cautionary note Proceedings of the 2nd USENIX Workshop on Electronic Commerce November 1996 Oakland, Calif, USA 1 11
-
Tamper resistance: A cautionary note
, pp. 1-11
-
-
Anderson, R.1
Kuhn, M.2
-
4
-
-
0003584029
-
-
National Institute of Standards and Technology Federal Information Processing Standards 140-2, NIST, May 2001
-
National Institute of Standards and Technology, Security Requirements for Cryptographic Modules. Federal Information Processing Standards 140-2, NIST, May 2001
-
Security Requirements for Cryptographic Modules
-
-
-
8
-
-
68949138994
-
Insider attack attribution using signal strength-based hyperbolic location estimation
-
Laurendeau C., Barbeau M., Insider attack attribution using signal strength-based hyperbolic location estimation Security and Communication Networks 2008 1 4 337 349
-
(2008)
Security and Communication Networks
, vol.1
, Issue.4
, pp. 337-349
-
-
Laurendeau, C.1
Barbeau, M.2
-
10
-
-
46749112734
-
Vehicular ad hoc networks: A new challenge for localization-based systems
-
Boukerche A., Oliveira H. A. B. F., Nakamura E. F., Loureiro A. A. F., Vehicular ad hoc networks: a new challenge for localization-based systems Computer Communications 2008 31 12 2838 2849
-
(2008)
Computer Communications
, vol.31
, Issue.12
, pp. 2838-2849
-
-
Boukerche, A.1
Oliveira, H.A.B.F.2
Nakamura, E.F.3
Loureiro, A.A.F.4
-
11
-
-
36749097842
-
Vehicular node localization using received-signal-strength indicator
-
Parker R., Valaee S., Vehicular node localization using received-signal-strength indicator IEEE Transactions on Vehicular Technology 2007 56 6, part 1 3371 3380
-
(2007)
IEEE Transactions on Vehicular Technology
, vol.56
, Issue.6 PART 1
, pp. 3371-3380
-
-
Parker, R.1
Valaee, S.2
-
14
-
-
84976295016
-
-
Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology (EUROCRYPT 94) May 1994 Perugia, Italy Springer Lecture Notes in Computer Science
-
Brands S., Chaum D., Distance-bounding protocols 765 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology (EUROCRYPT 94) May 1994 Perugia, Italy Springer 344 359 Lecture Notes in Computer Science
-
Distance-bounding protocols
, vol.765
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
15
-
-
68949157883
-
-
Proceedings of the Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks (DIWANS 06) September 2006 Los Angeles, Calif, USA
-
Xiao B., Yu B., Gao C., Detection and localization of sybil nodes in VANETs Proceedings of the Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks (DIWANS 06) September 2006 Los Angeles, Calif, USA 1 8
-
Detection and localization of sybil nodes in VANETs
, pp. 1-8
-
-
Xiao, B.1
Yu, B.2
Gao, C.3
-
16
-
-
33845597602
-
Position verification approaches for vehicular ad hoc networks
-
Leinmller T., Schoch E., Kargl F., Position verification approaches for vehicular ad hoc networks IEEE Wireless Communications 2006 13 5 16 21
-
(2006)
IEEE Wireless Communications
, vol.13
, Issue.5
, pp. 16-21
-
-
Leinmller, T.1
Schoch, E.2
Kargl, F.3
-
17
-
-
84947273682
-
The Sybil attack
-
Berlin, Germany Springer Lecture Notes in Computer Science
-
Douceur J. R., The Sybil attack Peer-to-Peer Systems 2002 2429 Berlin, Germany Springer 251 260 Lecture Notes in Computer Science
-
(2002)
Peer-to-Peer Systems
, vol.2429
, pp. 251-260
-
-
Douceur, J.R.1
-
18
-
-
68949152257
-
Privacy-preserving secure relative localization in vehicular networks
-
Tang L., Hong X., Bradford P. G., Privacy-preserving secure relative localization in vehicular networks Security and Communication Networks 2008 1 3 195 204
-
(2008)
Security and Communication Networks
, vol.1
, Issue.3
, pp. 195-204
-
-
Tang, L.1
Hong, X.2
Bradford, P.G.3
-
19
-
-
46749099829
-
Providing VANET security through active position detection
-
Yan G., Olariu S., Weigle M. C., Providing VANET security through active position detection Computer Communications 2008 31 12 2883 2897
-
(2008)
Computer Communications
, vol.31
, Issue.12
, pp. 2883-2897
-
-
Yan, G.1
Olariu, S.2
Weigle, M.C.3
-
21
-
-
17044379828
-
Real-time mobility tracking algorithms for cellular networks based on Kalman filtering
-
Zaidi Z. R., Mark B. L., Real-time mobility tracking algorithms for cellular networks based on Kalman filtering IEEE Transactions on Mobile Computing 2005 4 2 195 208
-
(2005)
IEEE Transactions on Mobile Computing
, vol.4
, Issue.2
, pp. 195-208
-
-
Zaidi, Z.R.1
Mark, B.L.2
-
23
-
-
68949160369
-
Probabilistic evidence aggregation for malicious node position bounding in wireless networks
-
Laurendeau C., Barbeau M., Probabilistic evidence aggregation for malicious node position bounding in wireless networks Journal of Networks 2009 4 1 9 18
-
(2009)
Journal of Networks
, vol.4
, Issue.1
, pp. 9-18
-
-
Laurendeau, C.1
Barbeau, M.2
-
24
-
-
33746084519
-
-
Proceedings of the 2nd IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS 06) June 2006 San Francisco, Calif, USA Springer Lecture Notes in Computer Science
-
Chen Y., Kleisouris K., Li X., Trappe W., Martin R. P., The robustness of localization algorithms to signal strength attacks: a comparative study 4026 Proceedings of the 2nd IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS 06) June 2006 San Francisco, Calif, USA Springer 546 563 Lecture Notes in Computer Science
-
The robustness of localization algorithms to signal strength attacks: A comparative study
, vol.4026
, pp. 546-563
-
-
Chen, Y.1
Kleisouris, K.2
Li, X.3
Trappe, W.4
Martin, R.P.5
-
25
-
-
34249810866
-
-
ANSI Standard X3.9-1978, 1978
-
American National Standards Institute, Programming Language FORTRAN. ANSI Standard X3.9-1978, 1978
-
Programming Language FORTRAN
-
-
-
27
-
-
47649090842
-
-
Proceedings of the 66th IEEE Vehicular Technology Conference (VTC 07) September-October 2007 Baltimore, Md, USA
-
Liechty L. C., Reifsnider E., Durgin G., Developing the best 2.4GHz propagation model from active network measurements Proceedings of the 66th IEEE Vehicular Technology Conference (VTC 07) September-October 2007 Baltimore, Md, USA 894 896
-
Developing the best 2.4GHz propagation model from active network measurements
, pp. 894-896
-
-
Liechty, L.C.1
Reifsnider, E.2
Durgin, G.3
-
28
-
-
68949100945
-
-
911 Service, FCC Code of Federal Regulations, Title 47, Part 20, Section 20.18, October 2007
-
Federal Communications Commission,. 911 Service, FCC Code of Federal Regulations, Title 47, Part 20, Section 20.18, October 2007
-
-
-
|