-
1
-
-
44649195976
-
Towards characterizing and classifying communication-based automotive applications from a wireless networking perspective
-
Dec.
-
F. Bai, T. Elbatt, G. Hollan, H. Krishnan, and V. Sadekar. Towards characterizing and classifying communication-based automotive applications from a wireless networking perspective. In Proceedings of IEEE Workshop on Automotive Networking and Applications (AutoNet), Dec. 2006.
-
(2006)
Proceedings of IEEE Workshop on Automotive Networking and Applications (AutoNet)
-
-
Bai, F.1
Elbatt, T.2
Hollan, G.3
Krishnan, H.4
Sadekar, V.5
-
5
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
D. Chaum. The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology, I(1), 1998.
-
(1998)
Journal of Cryptology
, vol.1
, pp. 1
-
-
Chaum, D.1
-
7
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Feb.
-
D. L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84-88, Feb. 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.L.1
-
8
-
-
84945124606
-
Multiparty computation from threshold homomorphic encryption
-
London, UK. Springer-Verlag
-
R. Cramer, I. Damgard, and J. B. Nielsen. Multiparty computation from threshold homomorphic encryption. In EUROCRYPT '01: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, pages 280-299, London, UK, 2001. Springer-Verlag.
-
(2001)
EUROCRYPT '01: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques
, pp. 280-299
-
-
Cramer, R.1
Damgard, I.2
Nielsen, J.B.3
-
10
-
-
70449605162
-
U.S. pitches wireless highway safety plan
-
Nov.
-
J. Duffy. U.S. pitches wireless highway safety plan. Network World, Nov.2005.
-
(2005)
Network World
-
-
Duffy, J.1
-
15
-
-
3042594839
-
The security and privacy of smart vehicles
-
J.-P. Hubaux, S. Capkun, and J. Luo. The security and privacy of smart vehicles. IEEE Security & Privacy magazine, 2(3):49-55, 2004.
-
(2004)
IEEE Security & Privacy Magazine
, vol.2
, Issue.3
, pp. 49-55
-
-
Hubaux, J.-P.1
Capkun, S.2
Luo, J.3
-
17
-
-
51349156734
-
ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications
-
to Appear
-
R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen. ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. In to Appear INFOCOM 2008.
-
(2008)
INFOCOM
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Ho, P.-H.4
Shen, X.5
-
18
-
-
84888559963
-
-
B. Lynn. The Pairing-Based Cryptography (PBC) library. http://crypto.stanford.edu/pbc
-
B. Lynn. The Pairing-Based Cryptography (PBC) library. http://crypto.stanford.edu/pbc.
-
-
-
-
19
-
-
44449171333
-
-
National Highway Traffic Safety Administration, Sept.
-
National Highway Traffic Safety Administration. 2005 state traffic data. http://www-nrd.nhtsa.dot.gov/pdf/nrd-30/NCSA/TSF2005/StateTrafficData05.pdf, Sept. 2006.
-
(2006)
2005 State Traffic Data
-
-
-
20
-
-
0242426103
-
The TESLA broadcast authentication protocol
-
Summer
-
A. Perrig, R. Canetti, J. D. Tygar, and D. Song. The TESLA broadcast authentication protocol. RSA CryptoBytes, 5(Summer), 2002.
-
(2002)
RSA CryptoBytes
, vol.5
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
23
-
-
57049149967
-
CARAVAN: Providing location privacy for vanet
-
Nov.
-
K. Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K. Sezaki. CARAVAN: Providing location privacy for vanet. In Proceedings of Embedded Security in Cars (ESCAR), Nov. 2005.
-
(2005)
Proceedings of Embedded Security in Cars (ESCAR)
-
-
Sampigethaya, K.1
Huang, L.2
Li, M.3
Poovendran, R.4
Matsuura, K.5
Sezaki, K.6
-
24
-
-
35349014325
-
Impact of pseudonym changes on geographic routing in vanets
-
E. Schoch, F. Kargl, T. Leinmller, S. Schlott, and P. Papadimitratos. Impact of pseudonym changes on geographic routing in vanets. In Proceedings of the European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS), 2006.
-
(2006)
Proceedings of the European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS)
-
-
Schoch, E.1
Kargl, F.2
Leinmller, T.3
Schlott, S.4
Papadimitratos, P.5
-
25
-
-
34548774576
-
Multidimensional range query over encrypted data
-
May
-
E. Shi, J. Bethencourt, H. Chan, D. Song, and A. Perrig. Multidimensional range query over encrypted data. In IEEE Symposium on Security and Privacy, May 2007.
-
(2007)
IEEE Symposium on Security and Privacy
-
-
Shi, E.1
Bethencourt, J.2
Chan, H.3
Song, D.4
Perrig, A.5
-
26
-
-
0009056296
-
-
VINT Project University of Berkeley/LBNL
-
VINT Project, University of Berkeley/LBNL. NS-2:network simulator. http://www.isi.edu/nsnam/ns/.
-
NS-2:network Simulator
-
-
-
27
-
-
34548305165
-
On the routing problem in disconnected vehicular networks
-
N. Wisitpongphan, F. Bai, P. Mudalige, V. Sadekar, and O. K. Tonguz. On the routing problem in disconnected vehicular networks. In Proceedings of the IEEE INFOCOM Minisymposia, 2007.
-
(2007)
Proceedings of the IEEE INFOCOM Minisymposia
-
-
Wisitpongphan, N.1
Bai, F.2
Mudalige, P.3
Sadekar, V.4
Tonguz, O.K.5
|