메뉴 건너뛰기




Volumn , Issue , 2010, Pages 176-183

Privacy in inter-vehicular networks: Why simple pseudonym change is not enough

Author keywords

[No Author keywords available]

Indexed keywords

INTER-VEHICLE COMMUNICATION SYSTEMS; LOCATION INFORMATION; LOCATION PRIVACY; SECURITY ARCHITECTURE; VEHICULAR NETWORKS;

EID: 77952124972     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WONS.2010.5437115     Document Type: Conference Paper
Times cited : (200)

References (23)
  • 1
    • 18744385858 scopus 로고    scopus 로고
    • JiST: An efficient approach to simulation using virtual machines
    • R. Barr, Z. Haas, and R. van Renesse. JiST: An efficient approach to simulation using virtual machines. Software Practice & Experience, 35(6):539-576, 2005.
    • (2005) Software Practice & Experience , vol.35 , Issue.6 , pp. 539-576
    • Barr, R.1    Haas, Z.2    Van Renesse, R.3
  • 2
    • 2942524994 scopus 로고    scopus 로고
    • Location Privacy in Pervasive Computing
    • A. Beresford and F. Stajano. Location Privacy in Pervasive Computing. IEEE Pervasive Computing, 2(1):46-55, 2003.
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.1 , pp. 46-55
    • Beresford, A.1    Stajano, F.2
  • 4
    • 37849048533 scopus 로고    scopus 로고
    • Efficient and robust pseudonymous authentication in VANET
    • New York, NY, USA, September ACM
    • G. Calandriello, P. Papadimitratos, J.-P. Hubaux, and A. Lioy. Efficient and robust pseudonymous authentication in VANET. In VANET '07, pages 19-28, New York, NY, USA, September 2007. ACM.
    • (2007) VANET '07 , pp. 19-28
    • Calandriello, G.1    Papadimitratos, P.2    Hubaux, J.-P.3    Lioy, A.4
  • 7
    • 34547365680 scopus 로고    scopus 로고
    • Privacy in VANETs using Changing Pseudonyms - Ideal and Real
    • M. Gerlach and F. Güttler. Privacy in VANETs using Changing Pseudonyms - Ideal and Real. In VTC2007-Spring, pages 2521-2525, 2007.
    • (2007) VTC2007-Spring , pp. 2521-2525
    • Gerlach, M.1    Güttler, F.2
  • 8
    • 67650312114 scopus 로고    scopus 로고
    • On the anonymity of home/work location pairs
    • H. Tokuda, M. Beigl, A. Friday, A. J. B. Brush, and Y. Tobe, editors, Pervasive Computing, 7th International Conference, Springer
    • P. Golle and K. Partridge. On the anonymity of home/work location pairs. In H. Tokuda, M. Beigl, A. Friday, A. J. B. Brush, and Y. Tobe, editors, Pervasive Computing, 7th International Conference, volume 5538 of Lecture Notes in Computer Science, pages 390-397. Springer, 2009.
    • (2009) Lecture Notes in Computer Science , vol.5538 , pp. 390-397
    • Golle, P.1    Partridge, K.2
  • 9
    • 24644488889 scopus 로고    scopus 로고
    • On the Anonymity of Periodic Location Samples
    • M. Gruteser and B. Hoh. On the Anonymity of Periodic Location Samples. In SPC, pages 179-192, 2005.
    • (2005) SPC , pp. 179-192
    • Gruteser, M.1    Hoh, B.2
  • 11
    • 85024429815 scopus 로고
    • A new approach to linear filtering and prediction problems
    • R. Kalman. A new approach to linear filtering and prediction problems. Transactions of the ASME-Journal of Basic Engineering, 82(Series D):35-45, 1960.
    • (1960) Transactions of the ASME-Journal of Basic Engineering , vol.82 , Issue.SERIES D , pp. 35-45
    • Kalman, R.1
  • 20
    • 0018689571 scopus 로고
    • An algorithm for tracking multiple targets
    • December
    • D. Reid. An algorithm for tracking multiple targets. IEEE Transactions on Automatic Control, 24:843-854, December 1979.
    • (1979) IEEE Transactions on Automatic Control , vol.24 , pp. 843-854
    • Reid, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.