-
2
-
-
84880503047
-
Vehicle ad hoc networks: Applications and related technical issues
-
3rd Quarter
-
Toor, Y., Muhlethaler, P., and Laouiti, A., "Vehicle ad hoc networks: applications and related technical issues", IEEE Communications Surveys and Tutorials., pp. 74 - 88, 3rd Quarter 2008.
-
(2008)
IEEE Communications Surveys and Tutorials
, pp. 74-88
-
-
Toor, Y.1
Muhlethaler, P.2
Laouiti, A.3
-
3
-
-
79952091975
-
Nat. Highway traffic safety admin
-
U.S. Dept. Transp.
-
U.S. Dept. Transp., "Nat. Highway Traffic Safety Admin.", Vehicle Safety Communications Project. 2006.
-
(2006)
Vehicle Safety Communications Project
-
-
-
4
-
-
37849009419
-
Secure incentives for commercial ad dissemination in vehicular networks
-
S. Lee, G. Pan, J. Park, M. Gerla, and S. Lu, "Secure incentives for commercial ad dissemination in vehicular networks", in Proc. ACM Int Symp. MobiHoc, pp. 150-159, 2007.
-
(2007)
Proc. ACM Int Symp. MobiHoc
, pp. 150-159
-
-
Lee, S.1
Pan, G.2
Park, J.3
Gerla, M.4
Lu, S.5
-
5
-
-
33750938846
-
Towards a security architecture for vehicular ad hoc networks
-
DOI 10.1109/ARES.2006.136, 1625333, Proceedings - First International Conference on Availability, Reliability and Security, ARES 2006
-
K. Pll, T. Nowey, and C. Mletzko, "Towards a security architecture for vehicular ad hoc networks", in Proc. 1st Int. Conf. Availab., Rel. Security, Vienna, Austria, pp. 374-381, Apr. 2006. (Pubitemid 44732667)
-
(2006)
Proceedings - First International Conference on Availability, Reliability and Security, ARES 2006
, vol.2006
, pp. 374-381
-
-
Plossl, K.1
Nowey, T.2
Mletzko, C.3
-
6
-
-
34548180601
-
Attacks on inter vehicle communication systems - An analysis
-
A. Aijaz, B. Bochow, D. Florian, A. Festag, M. Gerlach, R. Kroh, and L. Tim, "Attacks on inter vehicle communication systems - An analysis", in Proc. 3rd Int. Workshop Intell. Transp., 2006.
-
(2006)
Proc. 3rd Int. Workshop Intell. Transp.
-
-
Aijaz, A.1
Bochow, B.2
Florian, D.3
Festag, A.4
Gerlach, M.5
Kroh, R.6
Tim, L.7
-
7
-
-
58149123333
-
TSVC: Timed efficient and secure vehicular communications with privacy preserving
-
Dec.
-
X. Lin, X. Sun, X. Wang, C. Zhang, P.-H. Ho, and X. Shen, "TSVC: Timed efficient and secure vehicular communications with privacy preserving", IEEE Trans. on Wireless Communication, vol. 7, Issue 12, pp. 4987-4998, Dec. 2008.
-
(2008)
IEEE Trans. on Wireless Communication
, vol.7
, Issue.12
, pp. 4987-4998
-
-
Lin, X.1
Sun, X.2
Wang, X.3
Zhang, C.4
Ho, P.-H.5
Shen, X.6
-
8
-
-
36749076982
-
GSIS: A secure and privacy-preserving protocol for vehicular communications
-
DOI 10.1109/TVT.2007.906878
-
X. Lin, X. Sun, P.-H. Ho, and X. Shen, "TGSIS: A secure and privacy preserving protocol for vehicular communications", IEEE Trans. on Veh. Technol., vol. 56, no. 6, pp. 3442-3456, Nov. 2007. (Pubitemid 350201103)
-
(2007)
IEEE Transactions on Vehicular Technology
, vol.56
, Issue.6
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.-H.3
Shen, X.4
-
9
-
-
57049129831
-
An efficient message authentication scheme for vehicular communications
-
NOV.
-
C. Zhang, X. Lin, R. Lu, P.-H. Ho and X. Shen, "An Efficient Message Authentication scheme for Vehicular Communications", IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 57, NO. 6, NOV. 2008.
-
(2008)
IEEE Transactions on Vehicular Technology
, vol.57
, Issue.6
-
-
Zhang, C.1
Lin, X.2
Lu, R.3
Ho, P.-H.4
Shen, X.5
-
10
-
-
51449098979
-
An efficient identity-based batch verification scheme for vehicular sensor networks
-
Phoenix, AZ, April 2008
-
C. Zhang, R. Lu, X. Lin, P.-H. Ho and X. Shen, "An Efficient Identity-based Batch Verification scheme for Vehicular Sensor Networks", in Proc. IEEE INFOCOM, 2008, pp. 246 - 250, Phoenix, AZ, April 2008.
-
(2008)
Proc. IEEE INFOCOM
, pp. 246-250
-
-
Zhang, C.1
Lu, R.2
Lin, X.3
Ho, P.-H.4
Shen, X.5
-
11
-
-
51349156734
-
ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications
-
Phoenix, AZ, April
-
R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, "ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications", in Proc. IEEE INFOCOM, pp. 1229-1237, Phoenix, AZ, April 2008.
-
(2008)
Proc. IEEE INFOCOM
, pp. 1229-1237
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Ho, P.-H.4
Shen, X.5
-
12
-
-
0040271932
-
-
Cryptography 3rd ed. Boca Raton FL: CRC
-
D.R. Stingson, Cryptography, "Theory and Practice, 3rd ed. Boca Raton", FL: CRC, 2005.
-
(2005)
Theory and Practice
-
-
Stingson, D.R.1
-
13
-
-
0242426103
-
The TESLA broadcast authentication protocol
-
A. Perrig, R. Canetti, J. D. Tygar, and D. Song, "The TESLA broadcast authentication protocol, RSA Crypto.", vol. 5, no. 2, pp. 2-13, 2002.
-
(2002)
RSA Crypto
, vol.5
, Issue.2
, pp. 2-13
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
15
-
-
79952096529
-
-
Dedicated Short Range Communication (DSRC). [Online]. Available
-
Dedicated Short Range Communication (DSRC). [Online]. Available: http://grouper.ieee.org/groups/scc32/dsrc/index.html
-
-
-
-
16
-
-
79952080997
-
-
IEEE The Institute 6, Mar.
-
I. Berger, "Standards for car talk", IEEE The Institute, vol. 31, no. 1, p. 1 and p. 6, Mar. 2007.
-
(2007)
Standards for Car Talk
, vol.31
, Issue.1
, pp. 1
-
-
Berger, I.1
-
19
-
-
3042594839
-
The security and privacy of smart vehicles
-
May
-
Jean-Pierre Hubaux, Srdjan Capkun and Jun Luo, "The Security and Privacy of Smart Vehicles", IEEE Security and Privacy, vol. 2, no. 3, pp. 49-55, May 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.3
, pp. 49-55
-
-
Hubaux, J.-P.1
Capkun, S.2
Jun, L.3
-
20
-
-
33745948310
-
The security of vehicular ad hoc net-works
-
Alexandria, Va, USA, March
-
M. Raya and J.-P. Hubaux, "The security of vehicular ad hoc net-works", in Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '05), pp. 11-21, Alexandria, Va, USA, March 2005.
-
(2005)
Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '05)
, pp. 11-21
-
-
Raya, M.1
Hubaux, J.-P.2
-
21
-
-
32144450457
-
Balancing auditability and privacy in vehicular networks
-
Q2SWinet'05 - Proceedings of the First ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks
-
J. Y. Choi, M. Jakobsson, and S. Wetzel, "Balancing auditability and privacy in vehicular networks", in Proc. 1st ACM Int. Workshop Q2SWinet, pp. 79-87, 2005. (Pubitemid 43206624)
-
(2005)
Q2SWinet'05 - Proceedings of the First ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks
, pp. 79-87
-
-
Choi, J.Y.1
Jakobsson, M.2
Wetzel, S.3
-
22
-
-
67549090302
-
Proving reliability of anonymous information in VANETs
-
July
-
Gina Kounga, Thomas Walter, and Sven Lachmund, "Proving Reliability of Anonymous Information in VANETs", IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 58, NO. 6, July 2009.
-
(2009)
IEEE Transactions on Vehicular Technology
, vol.58
, Issue.6
-
-
Kounga, G.1
Walter, T.2
Lachmund, S.3
-
23
-
-
73149084743
-
Reducing communication overhead for wireless roaming authentication: Methods and performance evaluation
-
May
-
Men Long, Chwan-Hwa "John" Wu, and J. David Irwin, "Reducing Communication Overhead for Wireless Roaming Authentication: Methods and Performance Evaluation", iInternational Journal of Network Security, Vol.6, No.3, PP.331-341, May 2008.
-
(2008)
IInternational Journal of Network Security
, vol.6
, Issue.3
, pp. 331-341
-
-
Men, L.1
John Wu, C.-H.2
David Irwin, J.3
|