-
1
-
-
46749099079
-
A Secure and Efficient Communication Scheme with Authenticated Key Establishment and Privacy Preserving for Vehicular Ad Hoc Networks
-
Li, C.-T., Hwang, M.-S., Chu, Y.-P.: A Secure and Efficient Communication Scheme with Authenticated Key Establishment and Privacy Preserving for Vehicular Ad Hoc Networks. Computer Communications 31, 2803-2814 (2008)
-
(2008)
Computer Communications
, vol.31
, pp. 2803-2814
-
-
Li, C.-T.1
Hwang, M.-S.2
Chu, Y.-P.3
-
2
-
-
33845726678
-
Securing Vehicular Ad Hoc Networks
-
Raya, M., Hubaux, J.-P.: Securing Vehicular Ad Hoc Networks. J. Computer Security 15, 39-68 (2007)
-
(2007)
J. Computer Security
, vol.15
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.-P.2
-
3
-
-
34547529829
-
Security Requirements and Solution Concepts in Vehicular Ad Hoc Networks
-
Leinmuller, T., Schoch, E., Maihofer, C.: Security Requirements and Solution Concepts in Vehicular Ad Hoc Networks. In: Fourth Annual Conference on Wireless on Demand Network Systems and Services (WONS 2007), pp. 84-91 (2007)
-
(2007)
Fourth Annual Conference on Wireless on Demand Network Systems and Services (WONS
, pp. 84-91
-
-
Leinmuller, T.1
Schoch, E.2
Maihofer, C.3
-
4
-
-
57449105235
-
Secure Vehicular Communication Systems: Design and Architecture
-
Papadimitratos, P., Buttyan, L., Holczer, T., Schoch, E., Freudiger, J., Raya, M., Ma, Z., Kargl, F., Kung, A., Hubaux, J.-P.: Secure Vehicular Communication Systems: Design and Architecture. IEEE Communication Magazine 46, 110-118 (2008)
-
(2008)
IEEE Communication Magazine
, vol.46
, pp. 110-118
-
-
Papadimitratos, P.1
Buttyan, L.2
Holczer, T.3
Schoch, E.4
Freudiger, J.5
Raya, M.6
Ma, Z.7
Kargl, F.8
Kung, A.9
Hubaux, J.-P.10
-
6
-
-
76649090710
-
-
EPFL Vehicular Networks Security Project
-
EPFL Vehicular Networks Security Project, http://ivc.epfl.ch/
-
-
-
-
8
-
-
76649108005
-
-
SeVeCom (Secure Vehicle Communication) Project
-
SeVeCom (Secure Vehicle Communication) Project, http://www.sevecom.org/
-
-
-
-
9
-
-
59249093820
-
How to Protect Privacy in Floating Car Data Systems
-
Rass, S., Fuchs, S., Schaffer, M., Myamakya, K.: How to Protect Privacy in Floating Car Data Systems. In: Fifth ACM international workshop on Vehicular Inter NETworking, pp. 17-22 (2008)
-
(2008)
Fifth ACM international workshop on Vehicular Inter NETworking
, pp. 17-22
-
-
Rass, S.1
Fuchs, S.2
Schaffer, M.3
Myamakya, K.4
-
10
-
-
33746097415
-
-
Dotzer, F.: Privacy Issues in Vehicular Ad Hoc Networks. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, 3856, pp. 197-209. Springer, Heidelberg (2006)
-
Dotzer, F.: Privacy Issues in Vehicular Ad Hoc Networks. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 197-209. Springer, Heidelberg (2006)
-
-
-
-
11
-
-
38149010558
-
-
Buttyan, L., Holczer, T., Vajda, I.: On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, 4572, pp. 129-141. Springer, Heidelberg (2007)
-
Buttyan, L., Holczer, T., Vajda, I.: On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 129-141. Springer, Heidelberg (2007)
-
-
-
-
13
-
-
50249147682
-
Illusion Attack on VANET Applications - A Message Plausibility Problem
-
Lo, N.-W., Tsai, H.-C.: Illusion Attack on VANET Applications - A Message Plausibility Problem. In: IEEE Globecom Workshops, pp. 1-8 (2007)
-
(2007)
IEEE Globecom Workshops
, pp. 1-8
-
-
Lo, N.-W.1
Tsai, H.-C.2
-
14
-
-
56749161570
-
Strengthening Privacy Protection in VANETs
-
Burmester, M., Magkos, E., Chrissikopoulos, V.: Strengthening Privacy Protection in VANETs. In: IEEE International Conference on Wireless and Mobile Computing, pp. 508-513 (2008)
-
(2008)
IEEE International Conference on Wireless and Mobile Computing
, pp. 508-513
-
-
Burmester, M.1
Magkos, E.2
Chrissikopoulos, V.3
-
15
-
-
84857534647
-
Vehicle Behavior Analysis to Enhance Security in VANETs
-
Schmidt, R.K., Leinmuller, T., Schoch, E., Held, A., Schafer, G.: Vehicle Behavior Analysis to Enhance Security in VANETs. In: Fourth Workshop on Vehicle to Vehicle Communications (V2VCOM 2008), (2008)
-
(2008)
Fourth Workshop on Vehicle to Vehicle Communications (V2VCOM
-
-
Schmidt, R.K.1
Leinmuller, T.2
Schoch, E.3
Held, A.4
Schafer, G.5
-
16
-
-
67649544270
-
Maximizing Anonymity of a Vehicle
-
Chaurasia, B.K., Verma, S., Bhasker, S.M.: Maximizing Anonymity of a Vehicle. In: Fourth International Conference on Wireless Communication and Sensor Networks, pp. 95-98 (2008)
-
(2008)
Fourth International Conference on Wireless Communication and Sensor Networks
, pp. 95-98
-
-
Chaurasia, B.K.1
Verma, S.2
Bhasker, S.M.3
-
17
-
-
67649566010
-
Message broadcast in VANETs using Group Signature
-
Chaurasia, B.K., Verma, S., Bhasker, S.M.: Message broadcast in VANETs using Group Signature. In: Fourth International Conference on Wireless Communication and Sensor Networks, pp. 131-136 (2008)
-
(2008)
Fourth International Conference on Wireless Communication and Sensor Networks
, pp. 131-136
-
-
Chaurasia, B.K.1
Verma, S.2
Bhasker, S.M.3
-
18
-
-
84876396429
-
-
Schoch, E., et al.: Impact of Pseudonym Changes on Geographic Routing in VANETs. In: Buttyán, L., Gligor, V.D., Westhoff, D. (eds.) ESAS 2006. LNCS, 4357, pp. 43-57. Springer, Heidelberg (2006)
-
Schoch, E., et al.: Impact of Pseudonym Changes on Geographic Routing in VANETs. In: Buttyán, L., Gligor, V.D., Westhoff, D. (eds.) ESAS 2006. LNCS, vol. 4357, pp. 43-57. Springer, Heidelberg (2006)
-
-
-
-
19
-
-
38049020981
-
Probabilistic Isolation of Malicious Vehicles in Pseudonym Changing VANETs
-
Liu, B., Zhong, Y., Zhang, S.: Probabilistic Isolation of Malicious Vehicles in Pseudonym Changing VANETs. In: 7th IEEE International Conference on Computer and Information Technology, pp. 967-972 (2007)
-
(2007)
7th IEEE International Conference on Computer and Information Technology
, pp. 967-972
-
-
Liu, B.1
Zhong, Y.2
Zhang, S.3
-
21
-
-
56749180636
-
Preventing Profile Generation in Vehicular Networks
-
Scheuer, F., Plobi, K., Federrath, H.: Preventing Profile Generation in Vehicular Networks. In: IEEE International Conference on Wireless and Mobile Computing, pp. 520-525 (2008)
-
(2008)
IEEE International Conference on Wireless and Mobile Computing
, pp. 520-525
-
-
Scheuer, F.1
Plobi, K.2
Federrath, H.3
-
22
-
-
36349002968
-
Support of Anonymity in VANETs - Putting Pseudonymity into Practice
-
Fonseca, E., Festag, A., Baldessari, R., Aguiar, R.L.: Support of Anonymity in VANETs - Putting Pseudonymity into Practice. In: IEEE Wireless Communications and Networking Conference (WCNC 2007), pp. 3400-3405 (2007)
-
(2007)
IEEE Wireless Communications and Networking Conference (WCNC
, pp. 3400-3405
-
-
Fonseca, E.1
Festag, A.2
Baldessari, R.3
Aguiar, R.L.4
-
23
-
-
37849048533
-
Efficient and Robust Pseudonymous Authentication in VANET
-
Calandriello, G., Papadimitratos, P., Hubaux, J.-P., Lioy, A.: Efficient and Robust Pseudonymous Authentication in VANET. In: Fourth ACM International Workshop on Vehicular ad Hoc Networks, pp. 19-28 (2007)
-
(2007)
Fourth ACM International Workshop on Vehicular ad Hoc Networks
, pp. 19-28
-
-
Calandriello, G.1
Papadimitratos, P.2
Hubaux, J.-P.3
Lioy, A.4
-
24
-
-
58149135996
-
Pseudonym-on-demand: A New Pseudonym Refill Strategy for Vehicular Communications
-
Ma, Z., Kargl, F., Weber, M.: Pseudonym-on-demand: A New Pseudonym Refill Strategy for Vehicular Communications. In: IEEE 68th Vehicular Technology Conference (VTC 2008), pp. 1-5 (2008)
-
(2008)
IEEE 68th Vehicular Technology Conference (VTC
, pp. 1-5
-
-
Ma, Z.1
Kargl, F.2
Weber, M.3
-
26
-
-
47849101841
-
Strategies for Pseudonym Changes in Vehicular Ad Hoc Networks depending on Node Mobility
-
Eichler, S.: Strategies for Pseudonym Changes in Vehicular Ad Hoc Networks depending on Node Mobility. In: IEEE Intelligent Vehicles Symposium, pp. 541-546 (2007)
-
(2007)
IEEE Intelligent Vehicles Symposium
, pp. 541-546
-
-
Eichler, S.1
-
27
-
-
44949172702
-
A Privacy Aware and Efficient Security Infrastructure for Vehicular Ad Hoc Networks
-
Plobi, K., Federrath, H.: A Privacy Aware and Efficient Security Infrastructure for Vehicular Ad Hoc Networks. Computer Standards and Interfaces 30, 390-397 (2008)
-
(2008)
Computer Standards and Interfaces
, vol.30
, pp. 390-397
-
-
Plobi, K.1
Federrath, H.2
|