-
1
-
-
67650033286
-
"On the road" - Reflections on the security of vehicular communication systems
-
ICVES 2008. IEEE International Conference on sept.
-
P. Papadimitratos, ""On the Road" - Reflections on the security of vehicular communication systems," Vehicular Electronics and Safety, 2008. ICVES 2008. IEEE International Conference on, pp. 359-363, sept. 2008.
-
(2008)
Vehicular Electronics and Safety, 2008
, pp. 359-363
-
-
Papadimitratos, P.1
-
3
-
-
74549123859
-
Location security in geographic ad hoc routing for VANETs
-
ICUMT '09. International Conference on, 12-14
-
Z. Ren, W. Li, Q. Yang, S. Wu, and L. Chen, "Location Security in Geographic Ad hoc Routing for VANETs," in Ultra Modern Telecommunications Workshops, 2009. ICUMT '09. International Conference on, 12-14 2009, pp. 1-6.
-
(2009)
Ultra Modern Telecommunications Workshops, 2009
, pp. 1-6
-
-
Ren, Z.1
Li, W.2
Yang, Q.3
Wu, S.4
Chen, L.5
-
4
-
-
62949184270
-
Modeling roadside attacker behavior in VANETs
-
30 2008-dec. 4
-
T. Leinmüller, R. Schmidt, E. Schoch, A. Held, and G. Schafer, "Modeling Roadside Attacker Behavior in VANETs," GLOBECOM Workshops, 2008 IEEE, pp. 1-10, 30 2008-dec. 4 2008.
-
(2008)
GLOBECOM Workshops, 2008 IEEE
, pp. 1-10
-
-
Leinmüller, T.1
Schmidt, R.2
Schoch, E.3
Held, A.4
Schafer, G.5
-
5
-
-
62949146441
-
GPS based vehicular collision warning system using IEEE 802.15.4 MAC/PHY standard
-
ITST 2008. 8th International Conference on, 24-24
-
D. Anurag, S. Ghosh, and S. Bandyopadhyay, "GPS Based Vehicular Collision Warning System using IEEE 802.15.4 MAC/PHY Standard," in ITS Telecommunications, 2008. ITST 2008. 8th International Conference on, 24-24 2008, pp. 154-159.
-
(2008)
ITS Telecommunications, 2008
, pp. 154-159
-
-
Anurag, D.1
Ghosh, S.2
Bandyopadhyay, S.3
-
6
-
-
84953879491
-
Verifying mobility data under privacy considerations in car-to-X communication
-
October
-
H. Stuebing, A. Jaeger, N. Bißmeyer, C. Schmidt, and S. A. Huss, "Verifying Mobility Data under Privacy Considerations in Car-To-X Communication," ITS World Congress, October 2010.
-
(2010)
ITS World Congress
-
-
Stuebing, H.1
Jaeger, A.2
Bißmeyer, N.3
Schmidt, C.4
Huss, S.A.5
-
7
-
-
84857534647
-
Vehicle behavior analysis to enhance security in VANETs
-
R. K. Schmidt, T. Leinmueller, E. Schoch, A. Held, and G. Schaefer, "Vehicle Behavior Analysis to Enhance Security in VANETs," in Proceedings of the 4th IEEE Vehicle-to-Vehicle Communications Workshop (V2VCOM2008), 2008.
-
(2008)
Proceedings of the 4th IEEE Vehicle-to-vehicle Communications Workshop (V2VCOM2008)
-
-
Schmidt, R.K.1
Leinmueller, T.2
Schoch, E.3
Held, A.4
Schaefer, G.5
-
8
-
-
33845597602
-
Position verification approaches for vehicular ad hoc networks
-
DOI 10.1109/WC-M.2006.250353
-
T. Leinmüller, E. Schoch, and F. Kargl, "Position Verficiation Approaches for Vehicular Ad hoc Networks," Wireless Communications, IEEE, vol. 13, no. 5, pp. 16-21, october 2006. (Pubitemid 44934143)
-
(2006)
IEEE Wireless Communications
, vol.13
, Issue.5
, pp. 16-21
-
-
Leinmuller, T.1
Schoch, E.2
Kargl, F.3
-
9
-
-
70349189757
-
Distributed misbehavior detection in VANETs
-
WCNC 2009. IEEE, 5-8
-
M. Ghosh, A. Varghese, A. Kherani, and A. Gupta, "Distributed Misbehavior Detection in VANETs," in Wireless Communications and Networking Conference, 2009. WCNC 2009. IEEE, 5-8 2009, pp. 1-6.
-
(2009)
Wireless Communications and Networking Conference, 2009
, pp. 1-6
-
-
Ghosh, M.1
Varghese, A.2
Kherani, A.3
Gupta, A.4
-
10
-
-
46749099829
-
Providing VANET security through active position detection
-
mobility Protocols for ITS/VANET
-
"Providing VANET Security Through Active Position Detection," Computer Communications, vol. 31, no. 12, pp. 2883 - 2897, 2008, mobility Protocols for ITS/VANET.
-
(2008)
Computer Communications
, vol.31
, Issue.12
, pp. 2883-2897
-
-
-
12
-
-
34247328623
-
Detection and localization of sybil nodes in VANETs
-
New York, NY, USA: ACM
-
B. Xiao, B. Yu, and C. Gao, "Detection and Localization of Sybil Nodes in VANETs," in DIWANS '06: Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks. New York, NY, USA: ACM, 2006, pp. 1-8.
-
(2006)
DIWANS '06: Proceedings of the 2006 Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks
, pp. 1-8
-
-
Xiao, B.1
Yu, B.2
Gao, C.3
-
13
-
-
68949105568
-
Probabilistic localization and tracking of Malicious insiders using hyperbolic position bounding in vehicular networks
-
C. Laurendeau and M. Barbeau, "Probabilistic Localization and Tracking of Malicious Insiders using Hyperbolic Position Bounding in Vehicular Networks," EURASIP J. Wirel. Commun. Netw., vol. 2009, pp. 1-13, 2009.
-
(2009)
EURASIP J. Wirel. Commun. Netw.
, vol.2009
, pp. 1-13
-
-
Laurendeau, C.1
Barbeau, M.2
-
14
-
-
84961361574
-
A robust detection of the sybil attack in urban VANETs
-
Washington, DC, USA: IEEE Computer Society
-
C. Chen, X. Wang, W. Han, and B. Zang, "A Robust Detection of the Sybil Attack in Urban VANETs," in ICDCSW '09: Proceedings of the 2009 29th IEEE International Conference on Distributed Computing Systems Workshops. Washington, DC, USA: IEEE Computer Society, 2009, pp. 270-276.
-
(2009)
ICDCSW '09: Proceedings of the 2009 29th IEEE International Conference on Distributed Computing Systems Workshops
, pp. 270-276
-
-
Chen, C.1
Wang, X.2
Han, W.3
Zang, B.4
-
15
-
-
34247376546
-
Improved security in geographic ad hoc routing through autonomous position verification
-
DOI 10.1145/1161064.1161075, VANET - Proceedings of the Third ACM International Workshop on Vehicular Ad Hoc Networks
-
T. Leinmüller, C. Maihöfer, E. Schoch, and F. Kargl, "Improved Security in Geographic Ad hoc Routing through Autonomous Position Verification," in VANET '06: Proceedings of the 3rd international workshop on Vehicular ad hoc networks. New York, NY, USA: ACM, 2006, pp. 57-66. (Pubitemid 46634330)
-
(2006)
VANET - Proceedings of the Third ACM International Workshop on Vehicular Ad Hoc Networks
, vol.2006
, pp. 57-66
-
-
Leinmuller, T.1
Maihofer, C.2
Schoch, E.3
Kargl, F.4
-
16
-
-
72949119922
-
Extending Bayesian trust models regarding context-dependence and user friendly representation
-
New York, NY, USA: ACM
-
S. Ries, "Extending bayesian trust models regarding context-dependence and user friendly representation," in SAC '09: Proceedings of the 2009 ACM symposium on Applied Computing. New York, NY, USA: ACM, 2009, pp. 1294-1301.
-
(2009)
SAC '09: Proceedings of the 2009 ACM Symposium on Applied Computing
, pp. 1294-1301
-
-
Ries, S.1
-
17
-
-
35248816893
-
Certain trust: A trust model for users and agents
-
DOI 10.1145/1244002.1244342, Proceedings of the 2007 ACM Symposium on Applied Computing
-
Ries, "Certain Trust: A Trust Model for Users and Agents," in SAC '07: Proceedings of the 2007 ACM symposium on Applied computing. New York, NY, USA: ACM, 2007, pp. 1599-1604. (Pubitemid 47568532)
-
(2007)
Proceedings of the ACM Symposium on Applied Computing
, pp. 1599-1604
-
-
Ries, S.1
-
18
-
-
44049103260
-
Analyzing the robustness of certain trust
-
Trust Management and Security, June 18-20 Trondheim, Norway, Y. Karabulut, J. Mitchell, P. Herrmann, and C. D. Jenson, Eds. Springer Boston, 2008
-
S. Ries and A. Heinemann, "Analyzing the Robustness of Certain Trust," in Trust Management II, Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway, Y. Karabulut, J. Mitchell, P. Herrmann, and C. D. Jenson, Eds., vol. 263. Springer Boston, 2008, pp. 51-67.
-
(2008)
Trust Management II, Proceedings of IFIPTM 2008: Joint ITrust and PST Conferences on Privacy
, vol.263
, pp. 51-67
-
-
Ries, S.1
Heinemann, A.2
-
19
-
-
67049109143
-
Realistic simulation of V2X communication scenarios
-
APSCC '08. IEEE, 9-12
-
T. Queck, B. Schunemann, I. Radusch, and C. Meinel, "Realistic Simulation of V2X Communication Scenarios," in Asia-Pacific Services Computing Conference, 2008. APSCC '08. IEEE, 9-12 2008, pp. 1623-1627.
-
(2008)
Asia-pacific Services Computing Conference, 2008
, pp. 1623-1627
-
-
Queck, T.1
Schunemann, B.2
Radusch, I.3
Meinel, C.4
|