-
2
-
-
1342281463
-
The threat of intelligent collisions
-
J. Blum and A. Eskandarian, "The Threat of Intelligent Collisions," IT Professional, vol.6, no.1, pp. 24-29, 2004.
-
(2004)
IT Professional
, vol.6
, Issue.1
, pp. 24-29
-
-
Blum, J.1
Eskandarian, A.2
-
5
-
-
44649172603
-
Using TPMs to secure vehicular ad-hoc networks (VANETs)
-
G. Guette and C. Bryce, "Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs)," Proc. of WISTP 08, LNCS 5019, pp. 106-116, 2008.
-
(2008)
Proc. of WISTP 08, LNCS 5019
, pp. 106-116
-
-
Guette, G.1
Bryce, C.2
-
7
-
-
60349099898
-
Detecting the sybil attack cooperatively in wireless sensor networks
-
S. Lv, X. Wang, X Zhao and X Zhou, "Detecting the Sybil Attack Cooperatively in Wireless Sensor Networks," Proc. of International Conference on Computational Intelligence and Security (CIS '08), pp. 442-446, 2008
-
(2008)
Proc. of International Conference on Computational Intelligence and Security (CIS '08)
, pp. 442-446
-
-
Lv, S.1
Wang, X.2
Zhao, X.3
Zhou, X.4
-
8
-
-
3042785862
-
The sybil attack in sensor networks: Analysis & defenses
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil Attack in Sensor Networks: Analysis & Defenses." Proc. of International symposium on information processing in sensor networks, pp 259-268, 2004.
-
(2004)
Proc. of International Symposium on Information Processing in Sensor Networks
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
9
-
-
58149526685
-
Defending mechanisms against sybil attack in next generation mobile ad hoc networks
-
S. Pal, AK. Mukhopadhyay and PP. Bhattacharya, "Defending Mechanisms Against Sybil Attack in Next Generation Mobile Ad Hoc Networks," IETE Technical Review, vol 25, no 4, pp. 209-214, 2008
-
(2008)
IETE Technical Review
, vol.25
, Issue.4
, pp. 209-214
-
-
Pal, S.1
Mukhopadhyay, A.K.2
Bhattacharya, P.P.3
-
10
-
-
33845726678
-
Securing vehicular ad hoc networks
-
M. Raya and JP. Hubaux, "Securing Vehicular Ad Hoc Networks," Journal of Computer Security, Special Issue on Security of Ad Hoc and Sensor Networks, vol.15, no.1, pp. 39-68, 2007.
-
(2007)
Journal of Computer Security, Special Issue on Security of Ad Hoc and Sensor Networks
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.P.2
-
11
-
-
33845564340
-
Securing vehicular communications
-
M. Raya, P. Papadimitratos, and JP. Hubaux, "Securing Vehicular Communications," IEEE Wireless Communications Magazine, Special Issue on Inter-Vehicular Communications, vol.13, no.5, pp. 8-15, 2006.
-
(2006)
IEEE Wireless Communications Magazine, Special Issue on Inter-Vehicular Communications
, vol.13
, Issue.5
, pp. 8-15
-
-
Raya, M.1
Papadimitratos, P.2
Hubaux, J.P.3
-
13
-
-
50249168206
-
Privacy-preserving detection of sybil attacks in vehicular ad hoc networks
-
T. Zhou, R.R. Choudhury, P. Ning and K. Chakrabarty, "Privacy- Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks," Proc. of International Conference on MobiQuitous 2007, pp. 1-8, 2007
-
(2007)
Proc. of International Conference on MobiQuitous 2007
, pp. 1-8
-
-
Zhou, T.1
Choudhury, R.R.2
Ning, P.3
Chakrabarty, K.4
|