-
1
-
-
70349126577
-
Car talk
-
Oct.
-
J. Blau, "Car talk," IEEE Spectr., vol.45, no.10, p. 16, Oct. 2008.
-
(2008)
IEEE Spectr.
, vol.45
, Issue.10
, pp. 16
-
-
Blau, J.1
-
3
-
-
33746097415
-
Privacy issues in vehicular ad hoc networks
-
Proc. PET
-
F. Dötzer, "Privacy issues in vehicular ad hoc networks," in Proc. PET, vol.3856, Lecture Notes in Computer Science, 2005, pp. 197-209.
-
(2005)
Lecture Notes in Computer Science
, vol.3856
, pp. 197-209
-
-
Dötzer, F.1
-
4
-
-
48649088209
-
A group signature based secure and privacy-preserving vehicular communication framework
-
J. Guo, J. P. Baugh, and S. Wang, "A group signature based secure and privacy-preserving vehicular communication framework," in Proc. Mobile Netw. Veh. Environ., 2007, pp. 103-108.
-
(2007)
Proc. Mobile Netw. Veh. Environ.
, pp. 103-108
-
-
Guo, J.1
Baugh, J.P.2
Wang, S.3
-
5
-
-
36749076982
-
GSIS: A secure and privacy preserving protocol for vehicular communications
-
Nov.
-
X. Lin, X. Sun, P.-H. Ho, and X. Shen, "GSIS: A secure and privacy preserving protocol for vehicular communications," IEEE Trans. Veh. Technol., vol.56, no.6, pp. 3442-3456, Nov. 2007.
-
(2007)
IEEE Trans. Veh. Technol.
, vol.56
, Issue.6
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.-H.3
Shen, X.4
-
6
-
-
33845564340
-
Securing vehicular communications
-
Oct.
-
M. Raya, P. Papadimitratos, and J.-P. Hubaux, "Securing vehicular communications," Wireless Commun., vol.13, no.5, pp. 8-15, Oct. 2006.
-
(2006)
Wireless Commun.
, vol.13
, Issue.5
, pp. 8-15
-
-
Raya, M.1
Papadimitratos, P.2
Hubaux, J.-P.3
-
7
-
-
44949112970
-
Cross-layer privacy enhancement and non-repudiation in vehicular communication
-
Bern, Switzerland, Mar.
-
F. Armknecht, A. Festag, D. Westhoff, and K. Zeng, "Cross-layer privacy enhancement and non-repudiation in vehicular communication," in Proc. 4th WMAN, Bern, Switzerland, Mar. 2007.
-
(2007)
Proc. 4th WMAN
-
-
Armknecht, F.1
Festag, A.2
Westhoff, D.3
Zeng, K.4
-
8
-
-
33845726678
-
Securing vehicular ad hoc networks
-
M. Raya and J.-P. Hubaux, "Securing vehicular ad hoc networks," J. Comput. Secur.-Special Issue Security Ad Hoc Sensor Networks, vol.15, no.1, pp. 39-68, 2007.
-
(2007)
J. Comput. Secur.-Special Issue Security Ad Hoc Sensor Networks
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.-P.2
-
9
-
-
33845781153
-
Security issues in a future vehicular network
-
M. E. Zarki, S. Mehrotra, G. Tsudik, and N. Venkatasubramanian, "Security issues in a future vehicular network," in Proc. Eur. Wireless, 2002, pp. 270-274.
-
(2002)
Proc. Eur. Wireless
, pp. 270-274
-
-
Zarki, M.E.1
Mehrotra, S.2
Tsudik, G.3
Venkatasubramanian, N.4
-
10
-
-
33745948310
-
The security of vehicular ad hoc networks
-
Alexandria, VA, Nov.
-
M. Raya and J. Hubaux, "The security of vehicular ad hoc networks," in Proc. 3rd ACM Workshop Security Ad Hoc Sensor Netw., Alexandria, VA, Nov. 2005, pp. 11-21.
-
(2005)
Proc. 3rd ACM Workshop Security Ad Hoc Sensor Netw.
, pp. 11-21
-
-
Raya, M.1
Hubaux, J.2
-
11
-
-
34247336902
-
Efficient secure aggregation in VANETs
-
M. Raya, A. Aziz, and J.-P. Hubaux, "Efficient secure aggregation in VANETs," in Proc. 3rd VANET, 2006, pp. 67-75.
-
(2006)
Proc. 3rd VANET
, pp. 67-75
-
-
Raya, M.1
Aziz, A.2
Hubaux, J.-P.3
-
12
-
-
34247368518
-
Probabilistic validation of aggregated data in vehicular ad-hoc networks
-
F. Picconi, N. Ravi, M. Gruteser, and L. Iftode, "Probabilistic validation of aggregated data in vehicular ad-hoc networks," in Proc. 3rd VANET, 2006, pp. 76-85.
-
(2006)
Proc. 3rd VANET
, pp. 76-85
-
-
Picconi, F.1
Ravi, N.2
Gruteser, M.3
Iftode, L.4
-
14
-
-
35348977820
-
Eviction of misbehaving and faulty nodes in vehicular networks
-
Oct.
-
M. Raya, P. Papadimitratos, I. Aad, D. Jungels, and J.-P. Hubaux, "Eviction of misbehaving and faulty nodes in vehicular networks," IEEE J. Sel. Areas Commun., vol.25, no.8, pp. 1557-1568, Oct. 2007.
-
(2007)
IEEE J. Sel. Areas Commun.
, vol.25
, Issue.8
, pp. 1557-1568
-
-
Raya, M.1
Papadimitratos, P.2
Aad, I.3
Jungels, D.4
Hubaux, J.-P.5
-
15
-
-
57049149967
-
CARAVAN: Providing location privacy for VANET
-
Nov.
-
K. Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K. Sezaki, "CARAVAN: Providing location privacy for VANET," in Proc. ESCAR, Nov. 2005.
-
(2005)
Proc. ESCAR
-
-
Sampigethaya, K.1
Huang, L.2
Li, M.3
Poovendran, R.4
Matsuura, K.5
Sezaki, K.6
-
16
-
-
37849048533
-
Efficient and robust pseudonymous authentication in VANETs
-
G. Calandriello, P. Papadimitratos, A. Lioy, and J.-P. Hubaux, "Efficient and robust pseudonymous authentication in VANETs," in Proc. VANET, 2007, pp. 19-28.
-
(2007)
Proc. VANET
, pp. 19-28
-
-
Calandriello, G.1
Papadimitratos, P.2
Lioy, A.3
Hubaux, J.-P.4
-
17
-
-
33750956035
-
An application of information theory to intrusion detection
-
E. Eiland and L. Liebrock, "An application of information theory to intrusion detection," in Proc. IWIA, 2006, pp. 119-134.
-
(2006)
Proc. IWIA
, pp. 119-134
-
-
Eiland, E.1
Liebrock, L.2
-
18
-
-
84942256107
-
Statistical approaches to DDoS attack detection and response
-
L. Feinstein, D. Schnackenberg, R. Balupari, and D. Kindred, "Statistical approaches to DDoS attack detection and response," in Proc. DARPA Inf. Survivability Conf. Expo., 2003, pp. 303-314.
-
(2003)
Proc. DARPA Inf. Survivability Conf. Expo.
, pp. 303-314
-
-
Feinstein, L.1
Schnackenberg, D.2
Balupari, R.3
Kindred, D.4
-
19
-
-
0034836392
-
Information-theoretic measures for anomaly detection
-
W. Lee and D. Xiang, "Information-theoretic measures for anomaly detection," in Proc. IEEE Symp. Security Privacy, 2001, pp. 130-143.
-
(2001)
Proc. IEEE Symp. Security Privacy
, pp. 130-143
-
-
Lee, W.1
Xiang, D.2
-
20
-
-
14944372809
-
Detecting and correcting malicious data in VANETs
-
P. Golle, D. Greene, and J. Staddon, "Detecting and correcting malicious data in VANETs," in Proc. 1st ACM Int. Workshop Veh. Ad Hoc Netw., 2004, pp. 29-37.
-
(2004)
Proc. 1st ACM Int. Workshop Veh. Ad Hoc Netw.
, pp. 29-37
-
-
Golle, P.1
Greene, D.2
Staddon, J.3
-
21
-
-
34548179912
-
Enhancing the security of local danger warnings in VANETs-A simulative analysis of voting schemes
-
B. Ostermaier, F. Dötzer, and M. Strassberger, "Enhancing the security of local danger warnings in VANETs-A simulative analysis of voting schemes," in Proc. 2nd Int. Conf. Availability, Rel. Security, 2007, pp. 422-431.
-
(2007)
Proc. 2nd Int. Conf. Availability, Rel. Security
, pp. 422-431
-
-
Ostermaier, B.1
Dötzer, F.2
Strassberger, M.3
-
23
-
-
66149136922
-
Trustworthy privacypreserving car-generated announcements in vehicular ad hoc networks
-
May
-
V. Daza, J. Domingo-Ferrer, F. Sebe, and A. Viejo, "Trustworthy privacypreserving car-generated announcements in vehicular ad hoc networks," IEEE Trans. Veh. Technol., vol.58, no.4, pp. 1876-1886, May 2009.
-
(2009)
IEEE Trans. Veh. Technol.
, vol.58
, Issue.4
, pp. 1876-1886
-
-
Daza, V.1
Domingo-Ferrer, J.2
Sebe, F.3
Viejo, A.4
-
25
-
-
70349115255
-
Safety and privacy in vehicular communications
-
Proc. Privacy Location-Based Appl., Berlin, Germany
-
J. Domingo-Ferrer and Q.Wu, "Safety and privacy in vehicular communications," in Proc. Privacy Location-Based Appl., vol.5599, Lecture Notes in Computer Science, Berlin, Germany, 2009, pp. 173-189.
-
(2009)
Lecture Notes in Computer Science
, vol.5599
, pp. 173-189
-
-
Domingo-Ferrer, J.1
Wu, Q.2
-
26
-
-
67549090302
-
Proving reliability of anonymous information in VANETs
-
Jul.
-
G. Kounga, T. Walter, and S. Lachmund, "Proving reliability of anonymous information in VANETs," IEEE Trans. Veh. Technol., vol.58, no.6, pp. 2977-2989, Jul. 2009.
-
(2009)
IEEE Trans. Veh. Technol.
, vol.58
, Issue.6
, pp. 2977-2989
-
-
Kounga, G.1
Walter, T.2
Lachmund, S.3
-
27
-
-
85024290278
-
Group signatures
-
Proc. Eurocrypt, New York
-
D. Chaum and E. van Heyst, "Group signatures," in Proc. Eurocrypt, vol.547, Lecture Notes in Computer Science, New York, 1991, pp. 257-265.
-
(1991)
Lecture Notes in Computer Science
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
28
-
-
0008352491
-
A linkable group signature and its application to secret voting
-
T. Nakanishi, T. Fujiwara, and H. Watanabe, "A linkable group signature and its application to secret voting," Trans. Inf. Process. Soc. Jpn., vol.40, no.7, pp. 3085-3096, 1999.
-
(1999)
Trans. Inf. Process. Soc. Jpn.
, vol.40
, Issue.7
, pp. 3085-3096
-
-
Nakanishi, T.1
Fujiwara, T.2
Watanabe, H.3
-
29
-
-
67650682832
-
Asymmetric group key agreement
-
Proc. Eurocrypt, New York
-
Q. Wu, Y. Mu, W. Susilo, B. Qin, and J. Domingo-Ferrer, "Asymmetric group key agreement," in Proc. Eurocrypt, vol.5479, Lecture Notes in Computer Science, New York, 2009, pp. 153-170.
-
(2009)
Lecture Notes in Computer Science
, vol.5479
, pp. 153-170
-
-
Wu, Q.1
Mu, Y.2
Susilo, W.3
Qin, B.4
Domingo-Ferrer, J.5
-
31
-
-
85029541173
-
Towards practical public key systems secure against chosen ciphertext attacks
-
Proc. Crypto, New York
-
I. B. Damgård, "Towards practical public key systems secure against chosen ciphertext attacks," in Proc. Crypto, vol.576, Lecture Notes in Computer Science, New York, 1991, pp. 445-456.
-
(1991)
Lecture Notes in Computer Science
, vol.576
, pp. 445-456
-
-
Damgård, I.B.1
-
32
-
-
85001025766
-
Wallet databases with observers
-
Proc. Crypto
-
D. Chaum and T. P. Pedersen, "Wallet databases with observers," in Proc. Crypto, vol.740, Lecture Notes in Computer Science, 1992, pp. 89-105.
-
(1992)
Lecture Notes in Computer Science
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.P.2
-
34
-
-
33746042155
-
Compact group signatures without random oracles
-
Proc. Eurocrypt
-
X. Boyen and B. Waters, "Compact group signatures without random oracles," in Proc. Eurocrypt, vol.4004, Lecture Notes in Computer Science, 2006, pp. 427-444.
-
(2006)
Lecture Notes in Computer Science
, vol.4004
, pp. 427-444
-
-
Boyen, X.1
Waters, B.2
-
35
-
-
38049146172
-
Batch verification of short signatures
-
Proc. Eurocrypt
-
J. Camenisch, S. Hohenberger, and M. Ø. Pedersen, "Batch verification of short signatures," in Proc. Eurocrypt, vol.4515, Lecture Notes in Computer Science, 2007, pp. 246-263.
-
(2007)
Lecture Notes in Computer Science
, vol.4515
, pp. 246-263
-
-
Camenisch, J.1
Hohenberger, S.2
Pedersen, M.Ø.3
-
36
-
-
84957804123
-
Identification of bad signatures in batches
-
Proc. PKC
-
J. Pastuszak, D. Michatek, J. Pieprzyk, and J. Seberry, "Identification of bad signatures in batches," in Proc. PKC, vol.3958, Lecture Notes in Computer Science, 2000, pp. 28-45.
-
(2000)
Lecture Notes in Computer Science
, vol.3958
, pp. 28-45
-
-
Pastuszak, J.1
Michatek, D.2
Pieprzyk, J.3
Seberry, J.4
-
37
-
-
67349168446
-
BAT: A robust signature scheme for vehicular communications using Binary Authentication Tree
-
Apr.
-
Y. Jiang, M. Shi, X. Shen, and C. Lin, "BAT: A robust signature scheme for vehicular communications using Binary Authentication Tree," IEEE Trans. Wireless Commun., vol.8, no.4, pp. 1974-1983, Apr. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.4
, pp. 1974-1983
-
-
Jiang, Y.1
Shi, M.2
Shen, X.3
Lin, C.4
-
39
-
-
62949149982
-
-
[Online]. Available
-
The Network Simulator-ns. [Online]. Available: http://nsnam.isi.edu/ nsnam/index.php/Main Page
-
The Network Simulator-ns
-
-
-
40
-
-
14944349351
-
Modeling mobility for vehicular ad hoc networks
-
A. K. Saha and D. B. Johnson, "Modeling mobility for vehicular ad hoc networks," in Proc. 1st VANET, 2004, pp. 91-92.
-
(2004)
Proc. 1st VANET
, pp. 91-92
-
-
Saha, A.K.1
Johnson, D.B.2
-
41
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
Dec.
-
D. Pointcheval and J. Stern, "Security arguments for digital signatures and blind signatures," J. Cryptol., vol.13, no.3, pp. 361-396, Dec. 2000.
-
(2000)
J. Cryptol.
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
|