-
2
-
-
57449105235
-
Secure vehicular communication systems: Design and architecture
-
Nov.
-
P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung, and J.-P. Hubaux, "Secure Vehicular Communication Systems: Design and Architecture," IEEE Comm. Magazine, vol. 46, no. 11, pp. 100-109, Nov. 2008.
-
(2008)
IEEE Comm. Magazine
, vol.46
, Issue.11
, pp. 100-109
-
-
Papadimitratos, P.1
Buttyan, L.2
Holczer, T.3
Schoch, E.4
Freudiger, J.5
Raya, M.6
Ma, Z.7
Kargl, F.8
Kung, A.9
Hubaux, J.-P.10
-
3
-
-
57449086537
-
Secure vehicular communication systems: Implementation, performance, and research challenges
-
Nov.
-
F. Kargl, P. Papadimitratos, L. Buttyan, M. Müter, B. Wiedersheim, E. Schoch, T.-V. Thong, G. Calandriello, A. Held, A. Kung, and J.-P. Hubaux, "Secure Vehicular Communication Systems: Implementation, Performance, and Research Challenges," IEEE Comm. Magazine, vol. 46, no. 11, pp. 110-118, Nov. 2008.
-
(2008)
IEEE Comm. Magazine
, vol.46
, Issue.11
, pp. 110-118
-
-
Kargl, F.1
Papadimitratos, P.2
Buttyan, L.3
Müter, M.4
Wiedersheim, B.5
Schoch, E.6
Thong, T.-V.7
Calandriello, G.8
Held, A.9
Kung, A.10
Hubaux, J.-P.11
-
6
-
-
80052903549
-
-
"The eSafety eSecurity Working Group," http://www. esafetysupport.org/en/esafety-activities/esafetyworking-groups/esecurity.htm, 2009.
-
(2009)
The ESafety ESecurity Working Group
-
-
-
8
-
-
37849048533
-
Efficient and robust pseudonymous authentication in VANET
-
Sept.
-
G. Calandriello, P. Papadimitratos, J.-P. Hubaux, and A. Lioy, "Efficient and Robust Pseudonymous Authentication in VANET," Proc. Fourth ACM Int'l Workshop Vehicular Ad Hoc Networks (VANET '07), Sept. 2007.
-
(2007)
Proc. Fourth ACM Int'l Workshop Vehicular Ad Hoc Networks (VANET '07)
-
-
Calandriello, G.1
Papadimitratos, P.2
Hubaux, J.-P.3
Lioy, A.4
-
9
-
-
51049088211
-
Impact of vehicular communication security on transportation safety
-
Apr.
-
P. Papadimitratos, G. Calandriello, A. Lioy, and J.-P. Hubaux, "Impact of Vehicular Communication Security on Transportation Safety," Proc. IEEE INFOCOM, Apr. 2008.
-
(2008)
Proc. IEEE INFOCOM
-
-
Papadimitratos, P.1
Calandriello, G.2
Lioy, A.3
Hubaux, J.-P.4
-
14
-
-
47349131000
-
Architecture for secure and private vehicular communications
-
June
-
P. Papadimitratos, L. Buttyan, J.-P. Hubaux, F. Kargl, A. Kung, and M. Raya, "Architecture for Secure and Private Vehicular Communications," Proc. Seventh Int'l Conf. ITS Telecomm. (ITST '07), June 2007.
-
(2007)
Proc. Seventh Int'l Conf. ITS Telecomm. (ITST '07)
-
-
Papadimitratos, P.1
Buttyan, L.2
Hubaux, J.-P.3
Kargl, F.4
Kung, A.5
Raya, M.6
-
20
-
-
84992709574
-
Foundations of group signatures: Formal definition, simplified requirements and a construction based on trapdoor permutations
-
May
-
M. Bellare, D. Micciancio, and B. Warinschi, "Foundations of Group Signatures: Formal Definition, Simplified Requirements and a Construction Based on Trapdoor Permutations," Proc. Advances in Cryptology, May 2003.
-
(2003)
Proc. Advances in Cryptology
-
-
Bellare, M.1
Micciancio, D.2
Warinschi, B.3
-
24
-
-
80052892609
-
-
"The CVIS Project," http://www.cvisproject.org/, 2010.
-
(2010)
The CVIS Project
-
-
-
25
-
-
80052898336
-
-
"OpenSSL," http://www.openssl.org, 2010.
-
(2010)
OpenSSL
-
-
-
26
-
-
84863260311
-
Software implementation of the nist elliptic curves over prime fields
-
Apr.
-
M. Brown, D. Hankerson, J. Lopez, and A. Menezes, "Software Implementation of the NIST Elliptic Curves over Prime Fields," Proc. Conf. Topics in Cryptology: The Cryptographer's Track at RSA (CT-RSA '01), Apr. 2001.
-
(2001)
Proc. Conf. Topics in Cryptology: The Cryptographer's Track at RSA (CT-RSA '01)
-
-
Brown, M.1
Hankerson, D.2
Lopez, J.3
Menezes, A.4
-
27
-
-
35448969876
-
Pairing-based cryptography at high security levels
-
Report 2005/076
-
N. Koblitz and A. Menezes, "Pairing-Based Cryptography at High Security Levels," Cryptology ePrint Archive, Report 2005/076, 2005.
-
(2005)
Cryptology EPrint Archive
-
-
Koblitz, N.1
Menezes, A.2
-
28
-
-
0002006222
-
The m-distribution and a general formula of intensity distribution of the rapid fading
-
W.G. Hoffman, ed. Pergamon Press
-
M. Nakagami, "The m-Distribution and a General Formula of Intensity Distribution of the Rapid Fading," Statistical Methods in Radio Wave Propagation, W.G. Hoffman, ed., Pergamon Press, 1960.
-
(1960)
Statistical Methods in Radio Wave Propagation
-
-
Nakagami, M.1
-
29
-
-
42149166675
-
Overhaul of IEEE 802.11 modeling and simulation in NS-2
-
Oct.
-
Q. Chen, F. Schmidt-Eisenlohr, D. Jiang, M.-T. Moreno, L. Delgrossi, and H. Hartenstein, "Overhaul of IEEE 802.11 Modeling and Simulation in NS-2," Proc. 10th ACM Symp. Modeling, Analysis, and Simulation of Wirless and Mobile Systems (MSWiM '07), Oct. 2007.
-
(2007)
Proc. 10th ACM Symp. Modeling, Analysis, and Simulation of Wirless and Mobile Systems (MSWiM '07)
-
-
Chen, Q.1
Schmidt-Eisenlohr, F.2
Jiang, D.3
Moreno, M.-T.4
Delgrossi, L.5
Hartenstein, H.6
-
30
-
-
14944368943
-
Vehicle-to-vehicle safety messaging in DSRC
-
Oct.
-
Q. Xu, T. Mak, J. Ko, and R. Sengupta, "Vehicle-to-Vehicle Safety Messaging in DSRC," Proc. First ACM Int'l Workshop Vehicular Ad Hoc Networks (VANET '04), Oct. 2004.
-
(2004)
Proc. First ACM Int'l Workshop Vehicular Ad Hoc Networks (VANET '04)
-
-
Xu, Q.1
Mak, T.2
Ko, J.3
Sengupta, R.4
-
32
-
-
0003874621
-
-
M. Hazewinkel, ed., Springer-Verlag
-
Encyclopaedia of Mathematics, M. Hazewinkel, ed., Springer-Verlag, 2002.
-
(2002)
Encyclopaedia of Mathematics
-
-
-
37
-
-
31744433511
-
Vehicle-to-vehicle wireless communication protocols for enhancing highway traffic safety
-
DOI 10.1109/MCOM.2006.1580935
-
S. Biswas, R. Tatchikou, and F. Dion, "Vehicle-to-Vehicle Wireless Communication Protocols for Enhancing Highway Traffic Safety," IEEE Comm. Magazine, vol. 44, no. 1, pp. 74-82, Jan. 2006. (Pubitemid 43173982)
-
(2006)
IEEE Communications Magazine
, vol.44
, Issue.1
, pp. 74-82
-
-
Biswas, S.1
Tatchikou, R.2
Dion, F.3
-
38
-
-
34247355555
-
Cooperative collision warning using dedicated short range wireless communications
-
Sept.
-
T. ElBatt, S.K. Goel, G. Holland, H. Krishnan, and J. Parikh, "Cooperative Collision Warning Using Dedicated Short Range Wireless Communications," Proc. Third Int'l Workshop Vehicular Ad Hoc Networks (VANET '06), Sept. 2006.
-
(2006)
Proc. Third Int'l Workshop Vehicular Ad Hoc Networks (VANET '06)
-
-
Elbatt, T.1
Goel, S.K.2
Holland, G.3
Krishnan, H.4
Parikh, J.5
-
39
-
-
13244255377
-
A vehicle-to-vehicle communication protocol for cooperative collision warning
-
Aug.
-
X. Yang, J. Liu, F. Zhao, and N. Vaidya, "A Vehicle-to-Vehicle Communication Protocol for Cooperative Collision Warning," Proc. First Ann. Int'l Conf. Mobile and Ubiquitous Systems: Networking and Service (MobiQuitous '04), Aug. 2004.
-
(2004)
Proc. First Ann. Int'l Conf. Mobile and Ubiquitous Systems: Networking and Service (MobiQuitous '04)
-
-
Yang, X.1
Liu, J.2
Zhao, F.3
Vaidya, N.4
-
41
-
-
34547379480
-
How to win the clone wars: Efficient periodic n-times anonymous authentication
-
Oct.
-
J. Camenisch, S. Hohenberger, M. Kohlweiss, A. Lysyanskaya, and M. Meyerovich, "How to Win the Clone Wars: Efficient Periodic n-Times Anonymous Authentication," Proc. 13th ACM Conf. Computer and Comm. Security (CCS), Oct. 2006.
-
(2006)
Proc. 13th ACM Conf. Computer and Comm. Security (CCS)
-
-
Camenisch, J.1
Hohenberger, S.2
Kohlweiss, M.3
Lysyanskaya, A.4
Meyerovich, M.5
-
42
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
DOI 10.1145/4372.4373
-
D. Chaum, "Security without Identification: Transaction Systems to Make Big Brother Obsolete," Comm. ACM, vol. 28, no. 10, pp. 1030-1044, 1985. (Pubitemid 15587967)
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum David1
-
43
-
-
47349118711
-
Security architecture for vehicular communication
-
Mar.
-
M. Gerlach, A. Festag, T. Leinmuller, G. Goldacker, and C. Harsch, "Security Architecture for Vehicular Communication," Proc. Second Int'l Workshop Intelligent Transportation (WIT '07), Mar. 2007.
-
(2007)
Proc. Second Int'l Workshop Intelligent Transportation (WIT '07)
-
-
Gerlach, M.1
Festag, A.2
Leinmuller, T.3
Goldacker, G.4
Harsch, C.5
-
44
-
-
33845726678
-
Securing vehicular ad hoc networks
-
M. Raya and J. Hubaux, "Securing Vehicular Ad Hoc Networks," J. Computer Security, vol. 15, no. 1, pp. 39-68, 2007. (Pubitemid 46012642)
-
(2007)
Journal of Computer Security
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.-P.2
-
45
-
-
33845781153
-
Security issues in a future vehicular network
-
Feb.
-
M. El Zarki, S. Mehrotra, G. Tsudik, and N. Venkatasubramanian, "Security Issues in a Future Vehicular Network," Proc. European Wireless Conf. (EW '02), Feb. 2002.
-
(2002)
Proc. European Wireless Conf. (EW '02)
-
-
El Zarki, M.1
Mehrotra, S.2
Tsudik, G.3
Venkatasubramanian, N.4
-
48
-
-
1342281463
-
The threat of intelligent collisions
-
J. Blum and A. Eskandarian, "The Threat of Intelligent Collisions," IT Professional, vol. 6, pp. 24-29, 2004.
-
(2004)
IT Professional
, vol.6
, pp. 24-29
-
-
Blum, J.1
Eskandarian, A.2
-
49
-
-
34548180601
-
Attacks on intervehicle communication systems-an analysis
-
Mar.
-
A. Aijaz, B. Bochow, F. Dötzer, A. Festag, M. Gerlach, R. Kroh, and T. Leinmüller, "Attacks on Intervehicle Communication Systems-An Analysis," Proc. Third Int'l Workshop Intelligent Transportation (WIT '06), Mar. 2006.
-
(2006)
Proc. Third Int'l Workshop Intelligent Transportation (WIT '06)
-
-
Aijaz, A.1
Bochow, B.2
Dötzer, F.3
Festag, A.4
Gerlach, M.5
Kroh, R.6
Leinmüller, T.7
-
50
-
-
37149046758
-
Securing vehicular communications-assumptions, requirements, and principles
-
Nov.
-
P. Papadimitratos, V. Gligor, and J.-P. Hubaux, "Securing Vehicular Communications-Assumptions, Requirements, and Principles," Proc. Ann. Conf. Embedded Security in Cars (ESCAR '06), Nov. 2006.
-
(2006)
Proc. Ann. Conf. Embedded Security in Cars (ESCAR '06)
-
-
Papadimitratos, P.1
Gligor, V.2
Hubaux, J.-P.3
-
51
-
-
57049149967
-
CARAVAN: Providing location privacy for VANET
-
Nov.
-
M. Li, R. Poovendran, K. Sampigethaya, and L. Huang, "CARAVAN: Providing Location Privacy for VANET," Proc. Ann. Conf. Embedded Security in Cars (ESCAR '05), Nov. 2005.
-
(2005)
Proc. Ann. Conf. Embedded Security in Cars (ESCAR '05)
-
-
Li, M.1
Poovendran, R.2
Sampigethaya, K.3
Huang, L.4
-
52
-
-
35348977820
-
Eviction of misbehaving and faulty nodes in vehicular networks
-
DOI 10.1109/JSAC.2007.071006
-
M. Raya, P. Papadimitratos, I. Aad, D. Jungels, and J.-P. Hubaux, "Eviction of Misbehaving and Faulty Nodes in Vehicular Networks," IEEE J. Selected Areas in Comm., vol. 25, no. 8, pp. 1557-1568, Oct. 2007. (Pubitemid 47599172)
-
(2007)
IEEE Journal on Selected Areas in Communications
, vol.25
, Issue.8
, pp. 1557-1568
-
-
Raya, M.1
Papadimitratos, P.2
Aad, I.3
Jungels, D.4
Hubaux, J.-P.5
-
56
-
-
44949112970
-
Cross-layer privacy enhancement and non-repudiation in vehicular communication
-
Mar.
-
F. Armknecht, A. Festag, D. Westhoff, and K. Zeng, "Cross-Layer Privacy Enhancement and Non-Repudiation in Vehicular Communication," Proc. Fourth Workshop Mobile Ad-Hoc Networks (WMAN '07), Mar. 2007.
-
(2007)
Proc. Fourth Workshop Mobile Ad-Hoc Networks (WMAN '07)
-
-
Armknecht, F.1
Festag, A.2
Westhoff, D.3
Zeng, K.4
-
57
-
-
59249096666
-
Secure and efficient beaconing for vehicular networks
-
F. Kargl, E. Schoch, B. Wiedersheim, and T. Leinmüller, "Secure and Efficient Beaconing for Vehicular Networks," Proc. Fifth ACM Int'l Workshop Vehicular Ad Hoc Networks (VANET '08), 2008.
-
(2008)
Proc. Fifth ACM Int'l Workshop Vehicular Ad Hoc Networks (VANET '08)
-
-
Kargl, F.1
Schoch, E.2
Wiedersheim, B.3
Leinmüller, T.4
-
58
-
-
36749076982
-
GSIS: A secure and privacy-preserving protocol for vehicular communications
-
DOI 10.1109/TVT.2007.906878
-
X. Lin, X. Sun, P.-H. Ho, and X. Shen, "GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications," IEEE Trans. Vehicular Technology, vol. 56, no. 6, pp. 3442-3456, Nov. 2007. (Pubitemid 350201103)
-
(2007)
IEEE Transactions on Vehicular Technology
, vol.56
, Issue.6
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.-H.3
Shen, X.4
-
59
-
-
51349156734
-
ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications
-
Apr.
-
R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, "ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications," Proc. IEEE INFOCOM, Apr. 2008.
-
(2008)
Proc. IEEE INFOCOM
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Ho, P.-H.4
Shen, X.5
|