-
1
-
-
3042594839
-
The security and privacy of smart vehicles
-
Jean-Pierre Hubaux, Srdjan Čapkun. and Jun Luo, "The security and privacy of smart vehicles," IEEE Security and Privacy, vol. 4, pp. 49-55, 2004.
-
(2004)
IEEE Security and Privacy
, vol.4
, pp. 49-55
-
-
Hubaux, J.-P.1
Čapkun, S.2
Luo, J.3
-
3
-
-
35349016950
-
Amoeba: Robust location privacy scheme for vanet
-
Oct
-
K. Sampigethaya, M. Li, L. Huang, and R. Poovendran, "Amoeba: Robust location privacy scheme for vanet," IEEE Journal on Selected Areas in Communications, vol. 25, no. 8, pp. 1569 - 1589, Oct. 2007.
-
(2007)
IEEE Journal on Selected Areas in Communications
, vol.25
, Issue.8
, pp. 1569-1589
-
-
Sampigethaya, K.1
Li, M.2
Huang, L.3
Poovendran, R.4
-
4
-
-
33750879264
-
Enhancing security and privacy in traffic-monitoring systems
-
B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, "Enhancing security and privacy in traffic-monitoring systems," IEEE Pervasive Computing, vol. 5, no. 4, pp. 38-46,2006.
-
(2006)
IEEE Pervasive Computing
, vol.5
, Issue.4
, pp. 38-46
-
-
Hoh, B.1
Gruteser, M.2
Xiong, H.3
Alrabady, A.4
-
5
-
-
67650693995
-
A location privacy metric for v2x communication systems
-
Princeton, NJ, USA, March
-
Z. Ma, F. Kargl, and M. Weber,"A location privacy metric for v2x communication systems," in IEEE Sarnoff Symposium, Princeton, NJ, USA, March 2009.
-
(2009)
IEEE Sarnoff Symposium
-
-
Ma, Z.1
Kargl, F.2
Weber, M.3
-
6
-
-
57449105235
-
Secure vehicular communications: Design and architecture
-
November
-
P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung, and J.-P. Hubaux, "Secure vehicular communications: Design and architecture," IEEE Communications Magazine, vol. 46, no. 11, pp. 100-109, November 2008.
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.11
, pp. 100-109
-
-
Papadimitratos, P.1
Buttyan, L.2
Holczer, T.3
Schoch, E.4
Freudiger, J.5
Raya, M.6
Ma, Z.7
Kargl, F.8
Kung, A.9
Hubaux, J.-P.10
-
7
-
-
67650687281
-
Pseudonym-on-demand: A new pseudonym refill strategy for vehicular communications
-
Calgary, Canada, September
-
Z. Ma, F. Kargl, and M. Weber, "Pseudonym-on-demand: a new pseudonym refill strategy for vehicular communications," in WiVeC 2008, Calgary, Canada, September 2008.
-
(2008)
WiVeC 2008
-
-
Ma, Z.1
Kargl, F.2
Weber, M.3
-
8
-
-
84856043672
-
A mathematical theory of communication
-
July, October
-
C. E. Shannon, "A mathematical theory of communication," Bell system technical journal, vol. 27, pp. 379-423, 623-656, July, October 1948.
-
(1948)
Bell system technical journal
, vol.27
-
-
Shannon, C.E.1
-
10
-
-
38349067290
-
Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology,
-
Tech. Rep, Feb. 2008, vO.3l, Online, Available
-
A. Pfitzmann and M. Hansen, "Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology," Tech. Rep., Feb. 2008, vO.3l. [Online]. Available: http://dud.inf.tu-dresden.de/Anon-Terminology.shtml
-
-
-
Pfitzmann, A.1
Hansen, M.2
-
13
-
-
3242815149
-
Towards measuring anonymity
-
C. Diaz, S. Seys, J. Claessens, and B. Preneel, "Towards measuring anonymity," in Workshop on Privacy Enhancing Technologies, 2002.
-
(2002)
Workshop on Privacy Enhancing Technologies
-
-
Diaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
14
-
-
2942524994
-
Location privacy in pervasive computing
-
A. R. Beresford and F. Stajano, "Location privacy in pervasive computing," IEEE Pervasive Computing, vol. 2, no. 1, pp. 46-55, 2003.
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.1
, pp. 46-55
-
-
Beresford, A.R.1
Stajano, F.2
-
15
-
-
58149134080
-
On the effectiveness of changing pseudonyms to provide location privacy in VANETs
-
July
-
L. Buttyan, T. Holczer, and I. Vajda, "On the effectiveness of changing pseudonyms to provide location privacy in VANETs," in ESAS 2007, July 2007.
-
(2007)
ESAS 2007
-
-
Buttyan, L.1
Holczer, T.2
Vajda, I.3
-
16
-
-
58149131713
-
Mix-zones for location privacy in vehicular networks
-
J. Freudiger, M. Raya, M. Felegyhazi, P. Papadimitratos, and J.-P. Hubaux, "Mix-zones for location privacy in vehicular networks," in WiN-ITS, 2007.
-
(2007)
WiN-ITS
-
-
Freudiger, J.1
Raya, M.2
Felegyhazi, M.3
Papadimitratos, P.4
Hubaux, J.-P.5
-
17
-
-
24644488889
-
On the anonymity of periodic location samples
-
M. Gruteser and B. Hoh, "On the anonymity of periodic location samples." in Security in Pervasive Computing 2005, Boppard, Germany, vol. 3450, 2005, pp. 179-192.
-
(2005)
Security in Pervasive Computing 2005, Boppard, Germany
, vol.3450
, pp. 179-192
-
-
Gruteser, M.1
Hoh, B.2
-
18
-
-
57349108972
-
Preserving privacy in GPS traces via density-aware path cloaking
-
B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, "Preserving privacy in GPS traces via density-aware path cloaking," in ACM Conference on Computer and Communications Security (CCS), 2007.
-
(2007)
ACM Conference on Computer and Communications Security (CCS)
-
-
Hoh, B.1
Gruteser, M.2
Xiong, H.3
Alrabady, A.4
-
19
-
-
70349257237
-
Measuring unlinkability revisited
-
Alexandria, Virginia, October 27
-
L. Fischer, S. Katzenbeisser, and C. Eckert, "Measuring unlinkability revisited," in WPES '08: Proceedings of the 7th ACM workshop on Privacy in the electronic society, Alexandria, Virginia, October 27 2008.
-
(2008)
WPES '08: Proceedings of the 7th ACM workshop on Privacy in the electronic society
-
-
Fischer, L.1
Katzenbeisser, S.2
Eckert, C.3
-
20
-
-
38049035427
-
Inference attacks on location tracks
-
Toronto, Canada, May
-
J. Krumm, "Inference attacks on location tracks," in Fifth International Conference on Pervasive Computing, Toronto, Canada, May 2007, pp. 127-143.
-
(2007)
Fifth International Conference on Pervasive Computing
, pp. 127-143
-
-
Krumm, J.1
-
21
-
-
44649113095
-
On privacy in time series data mining
-
Y.Zhu, Y.Fu, and H. Fu, "On privacy in time series data mining," in PAKDD, 2008, pp. 479-493.
-
(2008)
PAKDD
, pp. 479-493
-
-
Zhu, Y.1
Fu, Y.2
Fu, H.3
|