-
1
-
-
47349131000
-
Architecture for Secure and Private Vehicular Communications
-
P. Papadimitratos, L. Buttyan, J.-P. Hubaux, F. Kargl, A. Kung, and M. Raya, "Architecture for Secure and Private Vehicular Communications," in Proccedings of the 7th International Conference on ITS Telecommunications, 2007.
-
Proccedings of the 7th International Conference on ITS Telecommunications, 2007
-
-
Papadimitratos, P.1
Buttyan, L.2
Hubaux, J.-P.3
Kargl, F.4
Kung, A.5
Raya, M.6
-
2
-
-
84893392013
-
Haggle: A networking architecture designed around mobile users
-
J. Scott, P. Hui, J. Crowcroft, and C. Diot, "Haggle: A networking architecture designed around mobile users," IFIP WONS, 2006.
-
(2006)
IFIP WONS
-
-
Scott, J.1
Hui, P.2
Crowcroft, J.3
Diot, C.4
-
4
-
-
85081505363
-
-
available at April
-
Email marketing report, available at http://email-marketing-reports.com, April 2008.
-
(2008)
Email Marketing Report
-
-
-
5
-
-
85081521345
-
-
Secure Networking and Computing Research Group, Arizona State University
-
Secure Networking and Computing Research Group, Arizona State University, "Email Trust Services," https://www.wreferral.com/EmailTrust/faces/ index.jsp, 2009.
-
(2009)
Email Trust Services
-
-
-
6
-
-
0032310543
-
Architecture of the dedicated short-range communications (DSRC) protocol
-
vol.3, May
-
C. Cseh, "Architecture of the dedicated short-range communications (DSRC) protocol," IEEE Vehicular Technology Conference (VTC), vol.3, pp. 2095-2099 vol.3, May 1998.
-
(1998)
IEEE Vehicular Technology Conference (VTC)
, vol.3
, pp. 2095-2099
-
-
Cseh, C.1
-
7
-
-
0012970453
-
Identity-based encryption from the weil pairing
-
Springer-Verlag
-
D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing," in Proceedings of the CRYPTO 01, Springer-Verlag, 2001.
-
(2001)
Proceedings of the CRYPTO 01
-
-
Boneh, D.1
Franklin, M.2
-
8
-
-
84946840347
-
Short signatures from the weil pairing
-
Proceedings of the Asiacrypt 2001
-
D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the weil pairing," in Proceedings of the Asiacrypt 2001, volume 2248 of LNCS, 2001, pp. 514-532.
-
(2001)
LNCS
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
9
-
-
80051862141
-
BGKM: An Efficient Secure Broadcasting Group Key Management Scheme
-
October
-
Z. Zhou and D. Huang, "BGKM: An Efficient Secure Broadcasting Group Key Management Scheme," Cryptology ePrint Archive: Report 2008/436, http://eprint.iacr.org/2008/436, October 2008.
-
(2008)
Cryptology EPrint Archive: Report 2008/436
-
-
Zhou, Z.1
Huang, D.2
-
10
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute-based encryption," in IEEE Symposium on Security and Privacy, 2007, pp. 321-334.
-
IEEE Symposium on Security and Privacy, 2007
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
11
-
-
33845331515
-
Minimization of Boolean functions
-
E. McCluskey, "Minimization of Boolean functions," Bell System Technical Journal, vol.35, no.5, pp. 1417-1444, 1956.
-
(1956)
Bell System Technical Journal
, vol.35
, Issue.5
, pp. 1417-1444
-
-
McCluskey, E.1
-
12
-
-
78650760549
-
Sat: Building new trust architecture for vehicular networks
-
X. Hong, D. Huang, M. Gerla, and Z. Cao, "Sat: Building new trust architecture for vehicular networks," in Proceedings of the 3rd ACM International Workshop on Mobility in the Evolving Internet Architecture (MobiArch), 2008.
-
Proceedings of the 3rd ACM International Workshop on Mobility in the Evolving Internet Architecture (MobiArch), 2008
-
-
Hong, X.1
Huang, D.2
Gerla, M.3
Cao, Z.4
|