-
1
-
-
0033077324
-
The space complexity of approximating the frequency moments
-
Alon, N., Matias, Y., and Szegedy, M. The space complexity of approximating the frequency moments. Journal of Computer and System Sciences 58, 1 (1999), 137-147.
-
(1999)
Journal of Computer and System Sciences
, vol.58
, Issue.1
, pp. 137-147
-
-
Alon, N.1
Matias, Y.2
Szegedy, M.3
-
2
-
-
44649195976
-
Towards characterizing and classifying communication-based automotive applications from a wireless networking perspective
-
Bai, F., Krishnan, H., Sadekar, V., Holland, G., and Elbatt, T. Towards characterizing and classifying communication-based automotive applications from a wireless networking perspective. In Proceedings of IEEE AutoNet (2006).
-
(2006)
Proceedings of IEEE AutoNet
-
-
Bai, F.1
Krishnan, H.2
Sadekar, V.3
Holland, G.4
Elbatt, T.5
-
3
-
-
0038297734
-
Counting distinct elements in a data stream
-
Bar-Yossef, Z., Jayram, T. S., Kumar, R., Sivakumar, D., and Trevisan, L. Counting distinct elements in a data stream. In Proceedings of RANDOM (2002).
-
(2002)
Proceedings of RANDOM
-
-
Bar-Yossef, Z.1
Jayram, T.S.2
Kumar, R.3
Sivakumar, D.4
Trevisan, L.5
-
4
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
Bloom, B. H. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 13, 7 (1970), 422-426.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
5
-
-
33845747795
-
Secure hierarchical in-network aggregation in sensor networks
-
Chan, H., Perrig, A., and Song, D. X. Secure hierarchical in-network aggregation in sensor networks. In Proceedings of ACM CCS (2006).
-
(2006)
Proceedings of ACM CCS
-
-
Chan, H.1
Perrig, A.2
Song, D.X.3
-
6
-
-
51349125793
-
Dynamic jamming mitigation for wireless broadcast networks
-
Chiang, J. T., and Hu, Y.-C. dynamic jamming mitigation for wireless broadcast networks. In Proceedings of IEEE INFOCOM (2008).
-
(2008)
Proceedings of IEEE INFOCOM
-
-
Chiang, J.T.1
Hu, Y.-C.2
-
7
-
-
77954982913
-
Resilient secure aggregation for vehicular networks
-
Dietzel, S., Schoch, E., Könings, B., Weber, M., and Kargl, F. Resilient secure aggregation for vehicular networks. IEEE Network: The Magazine of Global Internetworking 24 (2010), 26-31.
-
(2010)
IEEE Network: The Magazine of Global Internetworking
, vol.24
, pp. 26-31
-
-
Dietzel, S.1
Schoch, E.2
Könings, B.3
Weber, M.4
Kargl, F.5
-
9
-
-
0020828424
-
Probabilistic counting algorithms for data base applications
-
Flajolet, P., and Martin, G. N. Probabilistic counting algorithms for data base applications. Journal of Computer and System Sciences 31, 2 (1985), 182-209.
-
(1985)
Journal of Computer and System Sciences
, vol.31
, Issue.2
, pp. 182-209
-
-
Flajolet, P.1
Martin, G.N.2
-
10
-
-
84888171353
-
Relay attacks on passive keyless entry and start systems in modern cars
-
Francillon, A., Danev, B., and Capkun, S. Relay attacks on passive keyless entry and start systems in modern cars. In Proceedings of NDSS (2011).
-
(2011)
Proceedings of NDSS
-
-
Francillon, A.1
Danev, B.2
Capkun, S.3
-
11
-
-
56749178915
-
An efficient integrity-preserving scheme for hierarchical sensor aggregation
-
Frikken, K. B., and Joseph A. Dougherty, I. An efficient integrity-preserving scheme for hierarchical sensor aggregation. In Proceedings of ACM WiSec (2008).
-
(2008)
Proceedings of ACM WiSec
-
-
Frikken, K.B.1
Joseph, A.2
Dougherty, I.3
-
14
-
-
84966477020
-
Trial-use standard for wireless access in vehicular environments-security services for applications and management messages
-
IEEE. 1609.2
-
IEEE. 1609.2: Trial-use standard for wireless access in vehicular environments-security services for applications and management messages. IEEE Standards, 2006.
-
(2006)
IEEE Standards
-
-
-
16
-
-
78649303830
-
Vanet alert endorsement using multi-source filters
-
Kim, T. H.-J., Studer, A., Zhang, X., Dubey, R., Perrig, A., Bai, F., Bellur, B., and Iyer, A. Vanet alert endorsement using multi-source filters. In Proceedings of ACM VANET (2010).
-
(2010)
Proceedings of ACM VANET
-
-
Kim, T.H.-J.1
Studer, A.2
Zhang, X.3
Dubey, R.4
Perrig, A.5
Bai, F.6
Bellur, B.7
Iyer, A.8
-
17
-
-
14944374270
-
Urban multi-hop broadcast protocol for inter-vehicle communication systems
-
Korkmaz, G., Ekici, E., Özgüner, F., and Özgüner, U. Urban multi-hop broadcast protocol for inter-vehicle communication systems. In Proceedings of ACM VANET (2004).
-
(2004)
Proceedings of ACM VANET
-
-
Korkmaz, G.1
Ekici, E.2
Özgüner, F.3
Özgüner, U.4
-
18
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., and Savage, S. Experimental security analysis of a modern automobile. In Proceedings of IEEE Symposium on Security and Privacy (2010).
-
(2010)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
Mccoy, D.7
Kantor, B.8
Anderson, D.9
Shacham, H.10
Savage, S.11
-
19
-
-
85084161724
-
Probabilistic counting of large digital signature collections
-
Kuhn, M. G. Probabilistic counting of large digital signature collections. In Proceedings of USENIX Security Symposium (2000).
-
(2000)
Proceedings of USENIX Security Symposium
-
-
Kuhn, M.G.1
-
21
-
-
80051912360
-
Fast exclusion of errant devices from vehicular networks
-
Moore, T., Clulow, J., Papadimitratos, P., Anderson, R., and pierre Hubaux, J. Fast exclusion of errant devices from vehicular networks. In Proceedings of IEEE SECON (2008).
-
(2008)
Proceedings of IEEE SECON
-
-
Moore, T.1
Clulow, J.2
Papadimitratos, P.3
Anderson, R.4
Pierre Hubaux, J.5
-
22
-
-
42149159041
-
Synopsis diffusion for robust aggregation in sensor networks
-
Nath, S., Gibbons, P. B., Seshan, S., and Anderson, Z. R. Synopsis diffusion for robust aggregation in sensor networks. ACM Transactions on Sensor Networks 4, 2 (2008).
-
(2008)
ACM Transactions on Sensor Networks
, vol.4
, pp. 2
-
-
Nath, S.1
Gibbons, P.B.2
Seshan, S.3
Anderson, Z.R.4
-
23
-
-
0000664248
-
The broadcast storm problem in a mobile ad hoc network
-
Ni, S.-Y., Tseng, Y.-C., Chen, Y.-S., and Sheu, J.-P. The broadcast storm problem in a mobile ad hoc network. In Proceedings of ACM MobiCom (1999).
-
(1999)
Proceedings of ACM MobiCom
-
-
Ni, S.-Y.1
Tseng, Y.-C.2
Chen, Y.-S.3
Sheu, J.-P.4
-
24
-
-
37149046758
-
Securing vehicular communications - Assumptions, requirements, and principles
-
Papadimitratos, P., Gligor, V., and Hubaux, J.-P. Securing Vehicular Communications - Assumptions, Requirements, and Principles. In Proceedings of Workshop on Embedded Security in Cars (2006).
-
(2006)
Proceedings of Workshop on Embedded Security in Cars
-
-
Papadimitratos, P.1
Gligor, V.2
Hubaux, J.-P.3
-
28
-
-
33845726678
-
Securing vehicular ad hoc networks
-
Raya, M., and Hubaux, J.-P. Securing vehicular ad hoc networks. Journal of Computer Security 15 (2007), 39-68. (Pubitemid 46012642)
-
(2007)
Journal of Computer Security
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.-P.2
-
29
-
-
51349155690
-
On data centric trust establishment in ephemeral ad hoc networks
-
Raya, M., Papadimitratos, P., Gligor, V. D., and pierre Hubaux, J. On data centric trust establishment in ephemeral ad hoc networks. In Proceedings of IEEE INFOCOM (2008).
-
(2008)
Proceedings of IEEE INFOCOM
-
-
Raya, M.1
Papadimitratos, P.2
Gligor, V.D.3
Pierre Hubaux, J.4
-
30
-
-
70350627111
-
Adaptive message authentication for vehicular networks
-
Ristanovic, N., Papadimitratos, P., Theodorakopoulos, G., Hubaux, J.-P., and Leboudec, J.-Y. Adaptive message authentication for vehicular networks. In Proceedings of ACM VANET (2009).
-
(2009)
Proceedings of ACM VANET
-
-
Ristanovic, N.1
Papadimitratos, P.2
Theodorakopoulos, G.3
Hubaux, J.-P.4
Leboudec, J.-Y.5
-
31
-
-
85040565418
-
Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study
-
Rouf, I., Miller, R., Mustafa, H., Taylor, T., Oh, S., Xu, W., Gruteser, M., Trappe, W., and Seskar, I. Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study. In Proceedings of USENIX Security Symposium (2010).
-
(2010)
Proceedings of USENIX Security Symposium
-
-
Rouf, I.1
Miller, R.2
Mustafa, H.3
Taylor, T.4
Oh, S.5
Xu, W.6
Gruteser, M.7
Trappe, W.8
Seskar, I.9
-
32
-
-
0036377260
-
Dominating sets and neighbor elimination-based broadcasting algorithms in wireless networks
-
DOI 10.1109/71.980024
-
Stojmenovic, I., Seddigh, M., and Zunic, J. Dominating sets and neighbor elimination-based broadcasting algorithms in wireless networks. IEEE Transactions on Paral lel and Distributed Systems 13, 1 (2002), 14-25. (Pubitemid 35037238)
-
(2002)
IEEE Transactions on Parallel and Distributed Systems
, vol.13
, Issue.1
, pp. 14-25
-
-
Stojmenovic, I.1
Seddigh, M.2
Zunic, J.3
-
33
-
-
70449565205
-
TACKing together efficient authentication, revocation, and privacy in vanets
-
Studer, A., Shi, E., Bai, F., and Perrig, A. TACKing together efficient authentication, revocation, and privacy in vanets. In Proceedings of IEEE SECON (2009).
-
(2009)
Proceedings of IEEE SECON
-
-
Studer, A.1
Shi, E.2
Bai, F.3
Perrig, A.4
-
34
-
-
34548305165
-
On the routing problem in disconnected vehicular ad-hoc networks
-
Wisitpongphan, N., Bai, F., Mudalige, P., and Tonguz, O. On the routing problem in disconnected vehicular ad-hoc networks. In Proceedings of IEEE INFOCOM (2007).
-
(2007)
Proceedings of IEEE INFOCOM
-
-
Wisitpongphan, N.1
Bai, F.2
Mudalige, P.3
Tonguz, O.4
-
35
-
-
37249048864
-
Broadcast storm mitigation techniques in vehicular ad hoc networks
-
DOI 10.1109/MWC.2007.4407231
-
Wisitpongphan, N., Tonguz, O. K., Parikh, J. S., Mudalige, P., Bai, F., and Sadekar, V. Broadcast storm mitigation techniques in vehicular ad hoc networks. Wireless Communications, IEEE 14, 6 (2007), 84-94. (Pubitemid 350281218)
-
(2007)
IEEE Wireless Communications
, vol.14
, Issue.6
, pp. 84-94
-
-
Wisitpongphan, N.1
Tonguz, O.K.2
Parikh, J.S.3
Mudalige, P.4
Bai, F.5
Sadekar, V.6
-
36
-
-
33748089962
-
SDAP: A secure hop-by-hop data aggregation protocol for sensor networks
-
Yang, Y., Wang, X., Zhu, S., and Cao, G. SDAP: a secure hop-by-hop data aggregation protocol for sensor networks. In Proceedings of ACM MobiHoc (2006).
-
(2006)
Proceedings of ACM MobiHoc
-
-
Yang, Y.1
Wang, X.2
Zhu, S.3
Cao, G.4
-
37
-
-
51449098979
-
An efficient identity-based batch verification scheme for vehicular sensor networks
-
Zhang, C., Lu, R., Lin, X., Ho, P.-H., and Shen, X. An efficient identity-based batch verification scheme for vehicular sensor networks. In Proceedings of IEEE INFOCOM (2008).
-
(2008)
Proceedings of IEEE INFOCOM
-
-
Zhang, C.1
Lu, R.2
Lin, X.3
Ho, P.-H.4
Shen, X.5
|