-
1
-
-
84858918042
-
-
[Online]. Available
-
"CarTALK 2000." [Online]. Available: http://www.cartalk2000. net/
-
CarTALK 2000.
-
-
-
3
-
-
39449084181
-
Routing in vehicular ad hoc networks: A survey
-
F. Li and Y. Wang, "Routing in vehicular ad hoc networks: A survey," IEEE Vehicular Technology Magazine, vol. 2, no. 2, pp. 12-22, 2007.
-
(2007)
IEEE Vehicular Technology Magazine
, vol.2
, Issue.2
, pp. 12-22
-
-
Li, F.1
Wang, Y.2
-
4
-
-
77953313061
-
SPRING: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks
-
R. Lu, X. Lin, and X. Shen, "SPRING: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks," INFOCOM 2010, 2010.
-
INFOCOM 2010, 2010
-
-
Lu, R.1
Lin, X.2
Shen, X.3
-
5
-
-
46749099829
-
Providing VANET security through active position detection
-
Jul.
-
G. Yan and M. C. Weigle, "Providing VANET security through active position detection," Computer Communications, vol. 31, no. 12, pp. 2883- 2897, Jul. 2008.
-
(2008)
Computer Communications
, vol.31
, Issue.12
, pp. 2883-2897
-
-
Yan, G.1
Weigle, M.C.2
-
6
-
-
34247376546
-
Improved security in geographic ad hoc routing through autonomous position verification
-
T. Leinmüller, C. Maihöfer, E. Schoch, and F. Kargl, "Improved security in geographic ad hoc routing through autonomous position verification," Proc. 3rd International Workshop on Vehicular Ad Hoc Networks, pp. 57-66, 2006.
-
(2006)
Proc. 3rd International Workshop on Vehicular Ad Hoc Networks
, pp. 57-66
-
-
Leinmüller, T.1
Maihöfer, C.2
Schoch, E.3
Kargl, F.4
-
7
-
-
47649097496
-
Secure position-based routing for VANETs
-
C. Harsch, A. Festag, and P. Papadimitratos, "Secure position-based routing for VANETs," Proc. IEEE VTC-2007 Fall, pp. 26-30, 2007.
-
(2007)
Proc. IEEE VTC-2007 Fall
, pp. 26-30
-
-
Harsch, C.1
Festag, A.2
Papadimitratos, P.3
-
8
-
-
25844529484
-
Performance comparison of scalable location services for geographic ad hoc routing
-
S. Das, H. Pucha, and Y. Hu, "Performance comparison of scalable location services for geographic ad hoc routing," Proc. 24th IEEE CCS, vol. 2, pp. 1228-1239, 2005.
-
(2005)
Proc. 24th IEEE CCS
, vol.2
, pp. 1228-1239
-
-
Das, S.1
Pucha, H.2
Hu, Y.3
-
9
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport, "Password authentication with insecure communication," Commun. ACM, vol. 24, no. 11, pp. 770-772, 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
10
-
-
33750258287
-
GKMPAN: An efficient group rekeying scheme for secure multicast in ad-hoc networks
-
S. Zhu, S. Setia, S. Xu, and S. Jajodia, "GKMPAN: An efficient group rekeying scheme for secure multicast in ad-hoc networks," Journal of Computer Security, vol. 14, pp. 301-325, 2006.
-
(2006)
Journal of Computer Security
, vol.14
, pp. 301-325
-
-
Zhu, S.1
Setia, S.2
Xu, S.3
Jajodia, S.4
-
11
-
-
77951613883
-
MAAC: Message authentication acceleration protocol for vehicular ad hoc networks
-
A. Wasef and X. Shen, "MAAC: Message authentication acceleration protocol for vehicular ad hoc networks," Proc. IEEE GLOBECOM, 2009.
-
Proc. IEEE GLOBECOM, 2009
-
-
Wasef, A.1
Shen, X.2
-
12
-
-
0142002511
-
The elliptic curve digital signature algorithm (ECDSA)
-
D. Johnson, A. Menezes, and S. Vanstone, "The elliptic curve digital signature algorithm (ECDSA)," International Journal of Information Security, vol. 1, no. 1, pp. 36-63, 2001.
-
(2001)
International Journal of Information Security
, vol.1
, Issue.1
, pp. 36-63
-
-
Johnson, D.1
Menezes, A.2
Vanstone, S.3
-
13
-
-
70450166722
-
New explicit conditions of elliptic curve traces for FR-Reductions
-
ISEC2000 58-67
-
A. Miyaji, M. Nakabayashi, and S. Takano, "New explicit conditions of elliptic curve traces for FR-Reductions." IEIC Technical Report, vol. 100, no. 323(ISEC2000 58-67), pp. 99-108, 2000.
-
(2000)
IEIC Technical Report
, vol.100
, Issue.323
, pp. 99-108
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
-
14
-
-
1442357062
-
US secure hash algorithm 1 (SHA1)
-
Sept.
-
D. Eastlake and P. Jones, "US secure hash algorithm 1 (SHA1)," RFC 3174, Sept. 2001.
-
(2001)
RFC 3174
-
-
Eastlake, D.1
Jones, P.2
-
16
-
-
77951590798
-
-
[Online]. Available
-
"Crypto++ library 5.5.2." [Online]. Available: http://www.cryptopp.com/
-
Crypto++ Library 5.5.2.
-
-
-
17
-
-
26644463857
-
-
[Online]. Available
-
"The network simulator - ns-2." [Online]. Available: http://nsnam.isi.edu/nsnam/index.php/User Information
-
The Network Simulator - Ns-2
-
-
-
18
-
-
0034547115
-
GPSR: Greedy perimeter stateless routing for wireless networks
-
B. Karp and H. T. Kung, "GPSR: greedy perimeter stateless routing for wireless networks," Proc. 6th MCN Conference, pp. 243-254, 2000.
-
(2000)
Proc. 6th MCN Conference
, pp. 243-254
-
-
Karp, B.1
Kung, H.T.2
|