-
2
-
-
44649195976
-
Towards characterizing and classifying communication-based automotive applications from a wireless networking perspective
-
BAI, F., KRISHNAN, H., SADEKAR, V., HOLLAND, G., AND ELBATT, T. Towards characterizing and classifying communication-based automotive applications from a wireless networking perspective. In Proceedings of IEEE AutoNet (2006).
-
Proceedings of IEEE AutoNet (2006)
-
-
Bai, F.1
Krishnan, H.2
Sadekar, V.3
Holland, G.4
Elbatt, T.5
-
3
-
-
78649279855
-
Toward understanding characteristics of dedicated short range communications from a perspective of vehicular network engineers
-
BAI, F., STANCIL, D. D., AND KRISHNAN, H. Toward understanding characteristics of dedicated short range communications from a perspective of vehicular network engineers. In Proceedings of ACM MobiCom (2010).
-
Proceedings of ACM MobiCom (2010)
-
-
Bai, F.1
Stancil, D.D.2
Krishnan, H.3
-
4
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
BLOOM, B. H. Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13, 7 (1970), 422-426.
-
(1970)
Commun. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
5
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
CANETTI, R., GARAY, J., ITKIS, G., MICCIANCIO, D., NAOR, M., AND PINKAS, B. Multicast security: A taxonomy and some efficient constructions. In Proceedings of IEEE INFOCOMM (1999).
-
Proceedings of IEEE INFOCOMM (1999)
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
6
-
-
42149166675
-
Overhaul of IEEE 802.11 modeling and simulation in ns-2
-
CHEN, Q., SCHMIDT-EISENLOHR, F., JIANG, D., TORRENT-MORENO, M., DELGROSSI, L., AND HARTENSTEIN, H. Overhaul of IEEE 802.11 modeling and simulation in ns-2. In Proceedings of ACM MSWiM (2007).
-
Proceedings of ACM MSWiM (2007)
-
-
Chen, Q.1
Schmidt-Eisenlohr, F.2
Jiang, D.3
Torrent-Moreno, M.4
Delgrossi, L.5
Hartenstein, H.6
-
7
-
-
37749010823
-
Cross-layer jamming detection and mitigation in wireless broadcast networks
-
CHIANG, J. T., AND HU, Y.-C. Cross-layer jamming detection and mitigation in wireless broadcast networks. In Proceedings of ACM MobiCom (2007).
-
Proceedings of ACM MobiCom (2007)
-
-
Chiang, J.T.1
Hu, Y.-C.2
-
10
-
-
33750327688
-
DoS protection for reliably authenticated broadcast
-
GUNTER, C. A., KHANNA, S., TAN, K., AND VENKATESH, S. DoS protection for reliably authenticated broadcast. In Proceedings of NDSS (2004).
-
Proceedings of NDSS (2004)
-
-
Gunter, C.A.1
Khanna, S.2
Tan, K.3
Venkatesh, S.4
-
12
-
-
80051867757
-
Efficient and secure threshold-based event validation for vanets
-
HSIAO, H.-C., STUDER, A., DUBEY, R., SHI, E., AND PERRIG, A. Efficient and secure threshold-based event validation for vanets. In Proceedings of ACM Conference on Wireless Network Security (WiSec) (2011).
-
Proceedings of ACM Conference on Wireless Network Security (WiSec) (2011)
-
-
Hsiao, H.-C.1
Studer, A.2
Dubey, R.3
Shi, E.4
Perrig, A.5
-
14
-
-
84938015047
-
A method for the construction of minimum-redundancy codes
-
September
-
HUFFMAN, D. A. A method for the construction of minimum-redundancy codes. Institute of Radio Engineers 40, 9 (September 1952), 1098-1101.
-
(1952)
Institute of Radio Engineers
, vol.40
, Issue.9
, pp. 1098-1101
-
-
Huffman, D.A.1
-
16
-
-
77953077374
-
Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites
-
JUNG, J., KRISHNAMURTHY, B., AND RABINOVICH, M. Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites. In Proceedings of ACM WWW (2002).
-
Proceedings of ACM WWW (2002)
-
-
Jung, J.1
Krishnamurthy, B.2
Rabinovich, M.3
-
18
-
-
24944508408
-
Distillation codes and applications to DoS resistant multicast authentication
-
KARLOF, C., SASTRY, N., LI, Y., PERRIG, A., AND TYGAR, J. D. Distillation codes and applications to DoS resistant multicast authentication. In Proceedings of NDSS (2004).
-
Proceedings of NDSS (2004)
-
-
Karlof, C.1
Sastry, N.2
Li, Y.3
Perrig, A.4
Tygar, J.D.5
-
19
-
-
51349132481
-
Adaptive selective verification
-
KHANNA, S., VENKATESH, S. S., FATEMIEH, O., KHAN, F., AND GUNTER, C. A. Adaptive selective verification. In Proceedings of IEEE INFOCOM (2008).
-
Proceedings of IEEE INFOCOM (2008)
-
-
Khanna, S.1
Venkatesh, S.S.2
Fatemieh, O.3
Khan, F.4
Gunter, C.A.5
-
20
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
KOSCHER, K., CZESKIS, A., ROESNER, F., PATEL, S., KOHNO, T., CHECKOWAY, S., MCCOY, D., KANTOR, B., ANDERSON, D., SHACHAM, H., AND SAVAGE, S. Experimental security analysis of a modern automobile. In Proceedings of IEEE Symposium on Security and Privacy (2010).
-
Proceedings of IEEE Symposium on Security and Privacy (2010)
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
Mccoy, D.7
Kantor, B.8
Anderson, D.9
Shacham, H.10
Savage, S.11
-
23
-
-
77953306472
-
Randomized differential DSSS: Jamming-resistant wireless broadcast communication
-
LIU, Y., NING, P., DAI, H., AND LIU, A. Randomized differential DSSS: jamming-resistant wireless broadcast communication. In Proceedings of IEEE INFOCOM (2010).
-
Proceedings of IEEE INFOCOM (2010)
-
-
Liu, Y.1
Ning, P.2
Dai, H.3
Liu, A.4
-
25
-
-
85027170386
-
Reliable broadband communication using a burst erasure correcting code
-
MCAULEY, A. J. Reliable broadband communication using a burst erasure correcting code. SIGCOMM Comput. Commun. Rev. 20, 4 (1990), 297-306.
-
(1990)
SIGCOMM Comput. Commun. Rev.
, vol.20
, Issue.4
, pp. 297-306
-
-
Mcauley, A.J.1
-
27
-
-
0002586876
-
A digital signature based on a conventional encryption function
-
MERKLE, R. C. A digital signature based on a conventional encryption function. In Proceedings of CRYPTO (1987).
-
Proceedings of CRYPTO (1987)
-
-
Merkle, R.C.1
-
28
-
-
26844519980
-
Efficient certificate revocation system implementation: Huffman merkle hash tree (HuffMHT)
-
MUÑOZ, J. L., FORNÉ, J., ESPARZA, O., AND REY, M. Efficient certificate revocation system implementation: Huffman merkle hash tree (HuffMHT). Trust, Privacy and Security in Digital Business 3592 (2005), 119-127.
-
(2005)
Trust, Privacy and Security in Digital Business
, vol.3592
, pp. 119-127
-
-
Muñoz, J.L.1
Forné, J.2
Esparza, O.3
Rey, M.4
-
30
-
-
0035752112
-
The BiBa one-time signature and broadcast authentication protocol
-
PERRIG, A. The BiBa one-time signature and broadcast authentication protocol. In Proceedings of ACM CCS (2001).
-
Proceedings of ACM CCS (2001)
-
-
Perrig, A.1
-
31
-
-
0242426103
-
The TESLA broadcast authentication protocol
-
PERRIG, A., CANETTI, R., TYGAR, J. D., AND SONG, D. The TESLA broadcast authentication protocol. RSA CryptoBytes (2002).
-
(2002)
RSA CryptoBytes
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
32
-
-
33845726678
-
Securing vehicular ad hoc networks
-
RAYA, M., AND HUBAUX, J.-P. Securing vehicular ad hoc networks. JCS-SASN (2007).
-
(2007)
JCS-SASN
-
-
Raya, M.1
Hubaux, J.-P.2
-
33
-
-
0001174154
-
Polynomial codes over certain finite fields
-
REED, I., AND SOLOMON, G. Polynomial codes over certain finite fields. J. SIAM 8, 2 (1960), 300-304.
-
(1960)
J. SIAM
, vol.8
, Issue.2
, pp. 300-304
-
-
Reed, I.1
Solomon, G.2
-
34
-
-
70350627111
-
Adaptive message authentication for vehicular networks
-
RISTANOVIC, N., PAPADIMITRATOS, P., THEODORAKOPOULOS, G., HUBAUX, J.-P., AND LEBOUDEC, J.-Y. Adaptive message authentication for vehicular networks. In Proceedings of ACM VANET (2009).
-
Proceedings of ACM VANET (2009)
-
-
Ristanovic, N.1
Papadimitratos, P.2
Theodorakopoulos, G.3
Hubaux, J.-P.4
Leboudec, J.-Y.5
-
35
-
-
85040565418
-
Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study
-
ROUF, I., MILLER, R., MUSTAFA, H., TAYLOR, T., OH, S., XU, W., GRUTESER, M., TRAPPE, W., AND SESKAR, I. Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study. In Proceedings of USENIX Security Symposium (2010).
-
Proceedings of USENIX Security Symposium (2010)
-
-
Rouf, I.1
Miller, R.2
Mustafa, H.3
Taylor, T.4
Oh, S.5
Xu, W.6
Gruteser, M.7
Trappe, W.8
Seskar, I.9
-
37
-
-
74549134073
-
Flexible, extensible, and efficient VANET authentication
-
Dec.
-
STUDER, A., BAI, F., BELLUR, B., AND PERRIG, A. Flexible, extensible, and efficient VANET authentication. Journal of Communications and Networks 11, 6 (Dec. 2009), 574-588.
-
(2009)
Journal of Communications and Networks
, vol.11
, Issue.6
, pp. 574-588
-
-
Studer, A.1
Bai, F.2
Bellur, B.3
Perrig, A.4
-
38
-
-
37849012001
-
Containing denial-of-service attacks in broadcast authentication in sensor networks
-
WANG, R., DU, W., AND NING, P. Containing denial-of-service attacks in broadcast authentication in sensor networks. In Proceedings of ACM MobiHoc (2007).
-
Proceedings of ACM MobiHoc (2007)
-
-
Wang, R.1
Du, W.2
Ning, P.3
|