-
1
-
-
33746097415
-
-
Dötzer, F.: Privacy issues in vehicular ad hoc networks. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, 3856, pp. 197-209. Springer, Heidelberg (2006)
-
Dötzer, F.: Privacy issues in vehicular ad hoc networks. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 197-209. Springer, Heidelberg (2006)
-
-
-
-
2
-
-
26444497860
-
-
Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., Drielsma, P.H., Heám, P.C., Kouchnarenko, O., Mantovani, J., Mödersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J.S., Turuani, M., Viganò, L., Vigneron, L.: The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, 3576, pp. 281-285. Springer, Heidelberg (2005)
-
Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., Drielsma, P.H., Heám, P.C., Kouchnarenko, O., Mantovani, J., Mödersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J.S., Turuani, M., Viganò, L., Vigneron, L.: The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281-285. Springer, Heidelberg (2005)
-
-
-
-
3
-
-
33751044073
-
Talking to strangers: Authentication in adhoc wireless networks
-
San Diego, California February
-
Balfanz, D., Smetters, D., Stewart, P., Wong, H.: Talking to strangers: Authentication in adhoc wireless networks. In: Symposium on Network and Distributed Systems Security (NDSS 2002), San Diego, California (February 2002)
-
(2002)
Symposium on Network and Distributed Systems Security (NDSS
-
-
Balfanz, D.1
Smetters, D.2
Stewart, P.3
Wong, H.4
-
4
-
-
84949221411
-
-
Blake-Wilson, S., Menezes, A.: Authenticated Diffie-Hellman key agreement protocols. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, 1556, pp. 339-361. Springer, Heidelberg (1999)
-
Blake-Wilson, S., Menezes, A.: Authenticated Diffie-Hellman key agreement protocols. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, pp. 339-361. Springer, Heidelberg (1999)
-
-
-
-
5
-
-
70350600386
-
Using Animation to Improve Formal Specifications of Security Protocols
-
Boichut, Y., Genet, T., Glouche, Y., Heen, O.: Using Animation to Improve Formal Specifications of Security Protocols. In: 2nd Conference on Security in Network Architectures and Information Systems (SARSSI 2007), pp. 169-182 (2007)
-
(2007)
2nd Conference on Security in Network Architectures and Information Systems (SARSSI
, pp. 169-182
-
-
Boichut, Y.1
Genet, T.2
Glouche, Y.3
Heen, O.4
-
6
-
-
36349002968
-
Support of Anonymity in VANETs - Putting Pseudonymity into Practice
-
Fonseca, E., Festag, A., Baldessari, R., Aguiar, R.: Support of Anonymity in VANETs - Putting Pseudonymity into Practice. In: IEEE Wireless Communications and Networking Conference (2007)
-
(2007)
IEEE Wireless Communications and Networking Conference
-
-
Fonseca, E.1
Festag, A.2
Baldessari, R.3
Aguiar, R.4
-
7
-
-
47349118711
-
Security Architecture for Vehicular Communication
-
Gerlach, M., Festag, A., Leinmüller, T., Goldacker, G., Harsch, C.: Security Architecture for Vehicular Communication. In: Workshop on Intelligent Transportation (2007)
-
(2007)
Workshop on Intelligent Transportation
-
-
Gerlach, M.1
Festag, A.2
Leinmüller, T.3
Goldacker, G.4
Harsch, C.5
-
9
-
-
84937564790
-
Anonymity, unobservability, and pseudonymity - a proposal for terminology
-
Federrath, H, ed, Designing Privacy Enhancing Technologies, Springer, Heidelberg
-
Pfitzmann, A., Köhntopp, M.: Anonymity, unobservability, and pseudonymity - a proposal for terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 1-9. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2009
, pp. 1-9
-
-
Pfitzmann, A.1
Köhntopp, M.2
-
10
-
-
38049010942
-
Information confinement, privacy and security in RFID systems
-
Biskup, J, López, J, eds, ESORICS 2007, Springer, Heidelberg
-
Di Pietro, R., Molva, R.: Information confinement, privacy and security in RFID systems. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 187-202. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4734
, pp. 187-202
-
-
Di Pietro, R.1
Molva, R.2
-
11
-
-
4544246596
-
Secure long term communities in ad hoc networks
-
ACM, New York
-
Prigent, N., Bidan, C., Andreaux, J.P., Heen, O.: Secure long term communities in ad hoc networks. In: SASN 2003: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pp. 115-124. ACM, New York (2003)
-
(2003)
SASN 2003: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
, pp. 115-124
-
-
Prigent, N.1
Bidan, C.2
Andreaux, J.P.3
Heen, O.4
-
13
-
-
84947251443
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
Malcolm, J.A, Christianson, B, Crispo, B, Roe, M, eds, Security Protocols 1999, Springer, Heidelberg
-
Stajano, F., Anderson, R.J.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172-194. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1796
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.J.2
-
16
-
-
44649113207
-
Untraceability of RFID protocols
-
Onieva, J.A, Sauveron, D, Chaumette, S, Gollmann, D, Markantonakis, K, eds, WISTP 2008, Springer, Heidelberg
-
van Deursen, T., Mauw, S., Radomirović, S.: Untraceability of RFID protocols. In: Onieva, J.A., Sauveron, D., Chaumette, S., Gollmann, D., Markantonakis, K. (eds.) WISTP 2008. LNCS, vol. 5019, pp. 1-15. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5019
, pp. 1-15
-
-
van Deursen, T.1
Mauw, S.2
Radomirović, S.3
|