메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Establishing email-based social network trust for vehicular networks

Author keywords

Email social trust; Vehicular network

Indexed keywords

AUTOMATED AGENTS; DATA INTEGRITY; E-MAIL ADDRESS; EMAIL SERVICE PROVIDERS; IDENTITY BASED CRYPTOGRAPHY; PROXY SERVER; RESEARCH CHALLENGES; RESEARCH DIRECTIONS; SECURE GROUP COMMUNICATIONS; SECURITY PROTECTION; SOCIAL NETWORKS; TRUST EVALUATION; TRUST MODELS; VEHICULAR NETWORKS;

EID: 77951279929     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CCNC.2010.5421586     Document Type: Conference Paper
Times cited : (30)

References (12)
  • 2
    • 84893392013 scopus 로고    scopus 로고
    • Haggle: A networking architecture designed around mobile users
    • J. Scott, P. Hui, J. Crowcroft, and C. Diot, "Haggle: A networking architecture designed around mobile users," IFIP WONS, 2006.
    • (2006) IFIP WONS
    • Scott, J.1    Hui, P.2    Crowcroft, J.3    Diot, C.4
  • 4
    • 85081505363 scopus 로고    scopus 로고
    • available at April
    • Email marketing report, available at http://email-marketing-reports.com, April 2008.
    • (2008) Email Marketing Report
  • 5
    • 85081521345 scopus 로고    scopus 로고
    • Secure Networking and Computing Research Group, Arizona State University
    • Secure Networking and Computing Research Group, Arizona State University, "Email Trust Services," https://www.wreferral.com/EmailTrust/faces/ index.jsp, 2009.
    • (2009) Email Trust Services
  • 6
    • 0032310543 scopus 로고    scopus 로고
    • Architecture of the dedicated short-range communications (DSRC) protocol
    • vol.3, May
    • C. Cseh, "Architecture of the dedicated short-range communications (DSRC) protocol," IEEE Vehicular Technology Conference (VTC), vol.3, pp. 2095-2099 vol.3, May 1998.
    • (1998) IEEE Vehicular Technology Conference (VTC) , vol.3 , pp. 2095-2099
    • Cseh, C.1
  • 7
    • 0012970453 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Springer-Verlag
    • D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing," in Proceedings of the CRYPTO 01, Springer-Verlag, 2001.
    • (2001) Proceedings of the CRYPTO 01
    • Boneh, D.1    Franklin, M.2
  • 8
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the weil pairing
    • Proceedings of the Asiacrypt 2001
    • D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the weil pairing," in Proceedings of the Asiacrypt 2001, volume 2248 of LNCS, 2001, pp. 514-532.
    • (2001) LNCS , vol.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 9
    • 80051862141 scopus 로고    scopus 로고
    • BGKM: An Efficient Secure Broadcasting Group Key Management Scheme
    • October
    • Z. Zhou and D. Huang, "BGKM: An Efficient Secure Broadcasting Group Key Management Scheme," Cryptology ePrint Archive: Report 2008/436, http://eprint.iacr.org/2008/436, October 2008.
    • (2008) Cryptology EPrint Archive: Report 2008/436
    • Zhou, Z.1    Huang, D.2
  • 11
    • 33845331515 scopus 로고
    • Minimization of Boolean functions
    • E. McCluskey, "Minimization of Boolean functions," Bell System Technical Journal, vol.35, no.5, pp. 1417-1444, 1956.
    • (1956) Bell System Technical Journal , vol.35 , Issue.5 , pp. 1417-1444
    • McCluskey, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.