-
1
-
-
79955828952
-
Information dissemination and information assurance in vehicular networks: A survey
-
Feb., Los Angeles
-
P. Krishnamurthy, "Information dissemination and information assurance in vehicular networks: A survey," in A Conference Poster in iConferenc 08, Los Angeles, Feb. 2008.
-
(2008)
A Conference Poster in iConferenc 08
-
-
Krishnamurthy, P.1
-
2
-
-
42649121690
-
Security in vehicular ad hoc networks
-
Feb
-
L. Xiaodong, L. Rongxing, Z. Chenxi, Z. Haojin, H. Pin-Han, and S. Xuemin, "Security in vehicular ad hoc networks," IEEE Communications Magazine, Vol. 46, pp. 88-95, Feb. 2008.
-
(2008)
IEEE Communications Magazine
, vol.46
, pp. 88-95
-
-
Xiaodong, L.1
Rongxing, L.2
Chenxi, Z.3
Haojin, Z.4
Pin-Han, H.5
Xuemin, S.6
-
3
-
-
33845564340
-
Securing vehicular communications
-
DOI 10.1109/WC-M.2006.250352
-
M. Raya, P. Papadimitratos, and J.P. Hubaux, "Securing vehicular communications," IEEE Wireless Communications, Vol. 13, pp. 8-15, Oct. 2006. (Pubitemid 44934142)
-
(2006)
IEEE Wireless Communications
, vol.13
, Issue.5
, pp. 8-15
-
-
Raya, M.1
Papadimitratos, P.2
Hubaux, J.-P.3
-
4
-
-
46749099829
-
Providing VANET security through active position detection
-
July
-
G. Yan, S. Olariu, and M.C. Weigle, "Providing VANET security through active position detection," Computer Communications, Vol. 31, pp. 2883-97, July. 2008.
-
(2008)
Computer Communications
, vol.31
, pp. 2883-2897
-
-
Yan, G.1
Olariu, S.2
Weigle, M.C.3
-
5
-
-
84858243388
-
Probabilistic localization and tracking of malicious insiders using hyperbolic position bounding in vehicular networks
-
Jan
-
L. Christine, and B. Michel, "Probabilistic localization and tracking of malicious insiders using hyperbolic position bounding in vehicular networks," EURASIP Journal on Wirless. Communications, Vol. 2009, pp. 1-13, Jan. 2009.
-
(2009)
EURASIP Journal on Wirless. Communications
, vol.2009
, pp. 1-13
-
-
Christine, L.1
Michel, B.2
-
6
-
-
70449565205
-
TACKing together efficient authentication, revocation, and privacy in VANETs
-
Mesh and Ad Hoc Communications and Networks, SECON '09, Rome, June
-
A. Studer, E. Shi, B. Fan, and A. Perrig, "TACKing together efficient authentication, revocation, and privacy in VANETs," in 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON '09, Rome, pp. 1-9, June. 2009.
-
(2009)
6th Annual IEEE Communications Society Conference on Sensor
, pp. 1-9
-
-
Studer, A.1
Shi, E.2
Fan, B.3
Perrig, A.4
-
7
-
-
84947273682
-
The sybil attack
-
Heidelberg: Springer Berlin;
-
P. Druschel, F. Kaashoek, A. Rowstron, and J. Douceur, "The sybil attack," in Peer-to-Peer Systems.: Heidelberg: Springer Berlin; Vol. 2429, pp. 251-260, 2002.
-
(2002)
Peer-to-Peer Systems.
, vol.2429
, pp. 251-260
-
-
Druschel, P.1
Kaashoek, F.2
Rowstron, A.3
Douceur, J.4
-
8
-
-
48649088209
-
A group signature based secure and privacy-preserving vehicular communication framework
-
May
-
G. Jinhua, J.P. Baugh, and W. Shengquan, "A group signature based secure and privacy-preserving vehicular communication framework," in Mobile Networking for Vehicular Environments, Anchorage, ALASKA, pp. 103-8, May. 2007.
-
(2007)
Mobile Networking for Vehicular Environments, Anchorage, ALASKA
, pp. 103-108
-
-
Jinhua, G.1
Baugh, J.P.2
Shengquan, W.3
-
9
-
-
35349016950
-
AMOEBA: Robust location privacy scheme for VANET
-
DOI 10.1109/JSAC.2007.071007
-
K. Sampigethaya, L. Mingyan, H. Leping, and R. Poovendran, "AMOEBA: Robust location privacy scheme for VANET," IEEE Journal on Selected Areas in Communications, Vol. 25, pp. 1569-89, Feb. 2007. (Pubitemid 47599173)
-
(2007)
IEEE Journal on Selected Areas in Communications
, vol.25
, Issue.8
, pp. 1569-1589
-
-
Sampigethaya, K.1
Li, M.2
Huang, L.3
Poovendran, R.4
-
10
-
-
78650369686
-
Security analysis of Vehicular Ad Hoc Nerworks (VANET)
-
Malaysia Sept
-
G. Samara, W.A Al-Salihy, and R. Sures, "Security analysis of Vehicular Ad Hoc Nerworks (VANET)," in Second International Conference on Network Applications Protocols and Services (NETAPPS), Malaysia, pp. 55-60, Sept. 2010.
-
(2010)
Second International Conference on Network Applications Protocols and Services (NETAPPS
, pp. 55-60
-
-
Samara, G.1
Al-Salihy, W.A.2
Sures, R.3
-
11
-
-
62949127465
-
1609.2: Trial-use standard for wireless access in vehicular environments-security services for applications and management messages
-
1609.2: Trial-use standard for wireless access in vehicular environments-security services for applications and management messages," IEEE Standards, 2006.
-
(2006)
IEEE Standards
-
-
-
12
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
Feb
-
A. Perrig, R. Canetti, D. Song, and D. Tygar, "Efficient and secure source authentication for multicast," in Symposium on Network and Distributed Systems Security (NDSS), San Diego, California, pp. 35-46, Feb. 2001.
-
(2001)
Symposium on Network and Distributed Systems Security (NDSS), San Diego, California
, pp. 35-46
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, D.4
-
13
-
-
78649298118
-
Flexible, extensible, and efficient VANET authentication
-
Germany, March
-
A. Studer, F. Bai, B. Bellur, and A. Perrig, "Flexible, extensible, and efficient VANET authentication," in in 6th Conference on Embedded Security in Cars (Escar) Hamburg, Germany, pp. 22, March. 2008.
-
(2008)
6th Conference on Embedded Security in Cars (Escar) Hamburg
, pp. 22
-
-
Studer, A.1
Bai, F.2
Bellur, B.3
Perrig, A.4
-
14
-
-
33745948310
-
The security of vehicular ad hoc networks
-
Alexandria, VA
-
R. Maxim, and H. Jean-Pierre, "The security of vehicular ad hoc networks," In Proceedings of The 3rd ACM workshop on Security of ad hoc and sensor networks, Alexandria, VA, pp. 11-21, 2005.
-
(2005)
Proceedings of The 3rd ACM workshop on Security of ad hoc and Sensor Networks
, pp. 11-21
-
-
Maxim, R.1
Jean-Pierre, H.2
-
15
-
-
1542317849
-
Secure verification of location claims
-
San Diego, CA, Sept
-
S. Naveen, S. Umesh, and W. David, "Secure verification of location claims," in Proceedings of the 2nd ACM workshop on Wireless security, San Diego, CA, pp. 1-10, Sept. 2003.
-
(2003)
Proceedings of the 2nd ACM workshop on Wireless Security
, pp. 1-10
-
-
Naveen, S.1
Umesh, S.2
David, W.3
-
16
-
-
33745453101
-
Ad hoc network security: Peer identification and authentication using signal properties
-
DOI 10.1109/IAW.2005.1495987, 1495987, Proceedings from the Sixth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
-
T. Suen, and A. Yasinsac, "Ad hoc network security: Peer identification and authentication using signal properties," In Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop, West Point, New York, pp. 432-3, Jun. 2005. (Pubitemid 43948757)
-
(2005)
Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
, vol.2005
, pp. 432-433
-
-
Suen, T.1
Yasinsac, A.2
-
17
-
-
34247328623
-
Detection and localization of sybil nodes in VANETs
-
DOI 10.1145/1160972.1160974, DIWANS 2006 - Proceedings of the 2006 Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks (part of MobiCom 2006)
-
X. Bin, Y. Bo, and G. Chuanshan, "Detection and localization of sybil nodes in VANETs," In Proceedings of the workshop on Dependability issues in wireless ad hoc networks and sensor networks, Los Angeles, CA, pp. 1-8, Sept. 2006. (Pubitemid 46634404)
-
(2006)
DIWANS 2006 - Proceedings of the 2006 Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks (part of MobiCom 2006)
, vol.2006
, pp. 1-8
-
-
Bin, X.1
Bo, Y.2
Chuanshan, G.3
-
18
-
-
77956538118
-
Cross-layer location verification enhancement in vehicular networks
-
San Diego, CA., June
-
Y. Gongjun, S. Olariu, and M.C. Weigle, "Cross-layer location verification enhancement in vehicular networks," In IEEE Intelligent Vehicles Symposium (IV), San Diego, CA., pp. 95-100, June. 2010.
-
(2010)
IEEE Intelligent Vehicles Symposium (IV)
, pp. 95-100
-
-
Gongjun, Y.1
Olariu, S.2
Weigle, M.C.3
-
19
-
-
79952055803
-
S3P: A secure and privacy protecting protocol for VANET
-
Sept
-
A.O. Bayrak, and T. Acarman, "S3P: A secure and privacy protecting protocol for VANET," in The 6th International Conference on Wireless and Mobile Communications (ICWMC), Valencia, Spain, pp. 441-7, Sept. 2010.
-
(2010)
The 6th International Conference on Wireless and Mobile Communications (ICWMC), Valencia, Spain
, pp. 441-447
-
-
Bayrak, A.O.1
Acarman, T.2
-
20
-
-
79952240248
-
Reputation management in vehicular Ad Hoc Networks
-
Ningbo, China,Oct
-
Q. Ding, X. Li, M. Jiang, and X. Zhou, "Reputation management in vehicular Ad Hoc Networks," in The International Conference on Multimedia Technology (ICMT), Ningbo, China, pp. 1-5, Oct. 2010.
-
(2010)
The International Conference on Multimedia Technology (ICMT
, pp. 1-5
-
-
Ding, Q.1
Li, X.2
Jiang, M.3
Zhou, X.4
-
21
-
-
77951613883
-
MAAC: Message authentication acceleration protocol for vehicular Ad Hoc Networks
-
Honolulu, Hawaii, Nov
-
A. Wasef, and S. Xuemin, "MAAC: Message authentication acceleration protocol for vehicular Ad Hoc Networks," In IEEE Global Telecommunications Conference, GLOBECOM, Honolulu, Hawaii, pp. 1-6, Nov. 2009.
-
(2009)
IEEE Global Telecommunications Conference, GLOBECOM
, pp. 1-6
-
-
Wasef, A.1
Xuemin, S.2
-
22
-
-
67049168789
-
Optimizing pseudonym updation for anonymity in VANETS
-
Yilan, Taiwan, Dec
-
B.K. Chaurasia, and S. Verma, "Optimizing pseudonym updation for anonymity in VANETS," in The IEEE Asia-Pacific Services Computing Conference, APSCC '08., Yilan, Taiwan, pp. 1633-7, Dec. 2008.
-
(2008)
The IEEE Asia-Pacific Services Computing Conference, APSCC '08.
, pp. 1633-1637
-
-
Chaurasia, B.K.1
Verma, S.2
-
23
-
-
77952252546
-
A scalable robust authentication protocol for secure vehicular communications
-
Mar
-
Z. Lei, W. Qianhong, A. Solanas, and J. Domingo-Ferrer, "A scalable robust authentication protocol for secure vehicular communications," IEEE Transactions on Vehicular Technology, Vol. 59, pp. 1606-17, Mar. 2010.
-
(2010)
IEEE Transactions on Vehicular Technology
, vol.59
, pp. 1606-1617
-
-
Lei, Z.1
Qianhong, W.2
Solanas, A.3
Domingo-Ferrer, J.4
-
24
-
-
77952411946
-
VANET security framework for trusted grouping using TPM Hardware
-
Feb, Singapore
-
A.A. Singapore Wagan, B.M. Mughal, and H. Hasbullah, "VANET security framework for trusted grouping using TPM Hardware," in The Second International Conference on Communication Software and Networks, ICCSN '10, Singapore, pp. 309-312, Feb. 2010.
-
(2010)
The Second International Conference on Communication Software and Networks, ICCSN '10
, pp. 309-312
-
-
Singapore Wagan, A.A.1
Mughal, B.M.2
Hasbullah, H.3
-
25
-
-
78049388408
-
VANET security framework for trusted grouping using TPM hardware: Group formation and message dissemination
-
Kuala Lampur, Malaysia
-
A.A. Wagan, B.M. Mughal, and H. Hasbullah, "VANET security framework for trusted grouping using TPM hardware: Group formation and message dissemination," in International Symposium in Information Technology (ITSim), Kuala Lampur, Malaysia, pp. 607-11.
-
International Symposium in Information Technology (ITSim)
, pp. 607-611
-
-
Wagan, A.A.1
Mughal, B.M.2
Hasbullah, H.3
-
26
-
-
0001827537
-
Identity-based cryptosystems and signature schemes
-
LNCS
-
A. Shamir, "Identity-based cryptosystems and signature schemes," Proc. CRYPTO'84, LNCS 1984.
-
(1984)
Proc. CRYPTO'84
-
-
Shamir, A.1
-
27
-
-
57049119627
-
An efficient identity-based batch verification scheme for vehicular sensor networks
-
Phoenix, AZ, Apr
-
Z. Chenxi, L. Rongxing, L. Xiaodong, H. Pin-Han, and S. Xuemin, "An efficient identity-based batch verification scheme for vehicular sensor networks," In The 27th IEEE Conference on Computer Communications. INFOCOM, Phoenix, AZ, pp. 246-250, Apr. 2008.
-
(2008)
The 27th IEEE Conference on Computer Communications. INFOCOM
, pp. 246-250
-
-
Chenxi, Z.1
Rongxing, L.2
Xiaodong, L.3
Pin-Han, H.4
Xuemin, S.5
-
28
-
-
84858266128
-
A tree-based signature scheme for VANETs
-
New Orleans, LA, USA, Nov
-
J. Yixin, S. Minghui, S. Xuemin, and L. Chuang, "A tree-based signature scheme for VANETs," in IEEE Global Telecommunications Conference, GLOBECOM, New Orleans, LA, USA, pp. 1-5, Nov. 2008.
-
(2008)
IEEE Global Telecommunications Conference, GLOBECOM
, pp. 1-5
-
-
Yixin, J.1
Minghui, S.2
Xuemin, S.3
Chuang, L.4
-
29
-
-
77951572383
-
ASIC: Aggregate signatures and certificates verification scheme for vehicular networks
-
Honolulu, Hawaii, Nov
-
A. Wasef, and S. Xuemin, "ASIC: Aggregate signatures and certificates verification scheme for vehicular networks," In IEEE Global Telecommunications Conference, GLOBECOM, Honolulu, Hawaii, pp. 1-6, Nov 2009.
-
(2009)
IEEE Global Telecommunications Conference, GLOBECOM
, pp. 1-6
-
-
Wasef, A.1
Xuemin, S.2
-
30
-
-
77952515986
-
Secure vehicle-to-roadside communication protocol using certificate-based cryptosystem
-
Apr
-
Xiong Hu, Qin Zhiguang, and L. Fagen, "Secure vehicle-to-roadside communication protocol using certificate-based cryptosystem," IETE Technical Review, Vol. 27, pp. 214-9, Apr. 2010.
-
(2010)
IETE Technical Review
, vol.27
, pp. 214-219
-
-
Hu, X.1
Zhiguang, Q.2
Fagen, L.3
-
31
-
-
72449198073
-
Providing VANET position integrity through filtering
-
St. Louis, Missouri, Oct
-
Y. Gongjun, C. Xingwang, and S. Olariu, "Providing VANET position integrity through filtering," in The 12th International IEEE Conference on Intelligent Transportation Systems, ITSC '09, St. Louis, Missouri, pp. 1-6, Oct. 2009.
-
(2009)
The 12th International IEEE Conference on Intelligent Transportation Systems, ITSC '09
, pp. 1-6
-
-
Gongjun, Y.1
Xingwang, C.2
Olariu, S.3
-
32
-
-
1542341270
-
Location-based authentication: Grounding cyberspace for better security
-
Feb
-
D.E. Denning, and P.F. MacDoran, "Location-based authentication: Grounding cyberspace for better security," Computer Fraud and Security, Vol. 1996, pp. 12-6, Feb. 1996.
-
(1996)
Computer Fraud and Security
, vol.1996
, pp. 12-16
-
-
Denning, D.E.1
MacDoran, P.F.2
-
33
-
-
39449100938
-
Key management requirements for PTC operations
-
Feb
-
M. Hartong, R. Goel, and D. Wijesekera, "Key management requirements for PTC operations," IEEE Vehicular Technology Magazine, Vol. 2, pp. 4-11, Feb. 2008.
-
(2008)
IEEE Vehicular Technology Magazine
, vol.2
, pp. 4-11
-
-
Hartong, M.1
Goel, R.2
Wijesekera, D.3
-
34
-
-
77954982913
-
Resilient secure aggregation for vehicular networks
-
Jan
-
S. Dietzel, E. Schoch, B. Konings, M. Weber, and F. Kargl, "Resilient secure aggregation for vehicular networks," IEEE Network, Vol. 24, pp. 26-31, Jan. 2010.
-
(2010)
IEEE Network
, vol.24
, pp. 26-31
-
-
Dietzel, S.1
Schoch, E.2
Konings, B.3
Weber, M.4
Kargl, F.5
-
35
-
-
84961361574
-
A robust detection of the sybil attack in urban VANETs
-
Montreal, Quebec, Canada, June
-
C. Chen, W. Xin, H. Weili, and Z. Binyu, "A robust detection of the sybil attack in urban VANETs," in 29th IEEE International Conference on Distributed Computing Systems Workshops, ICDCS., Montreal, Quebec, Canada, pp. 270-6, June. 2009.
-
(2009)
29th IEEE International Conference on Distributed Computing Systems Workshops, ICDCS.
, pp. 270-276
-
-
Chen, C.1
Xin, W.2
Weili, H.3
Binyu, Z.4
-
36
-
-
84890104386
-
VARS: A vehicle ad-hoc network reputation system
-
WoWMoM, Taormina, Italy, May
-
F. Dotzer, L. Fischer, and P. Magiera, "VARS: A vehicle ad-hoc network reputation system," in Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, WoWMoM, Taormina, Italy, pp. 454-6, May. 2005.
-
(2005)
Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks
, pp. 454-456
-
-
Dotzer, F.1
Fischer, L.2
Magiera, P.3
-
37
-
-
51249100419
-
RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks
-
Beijing, May
-
Z. Chenxi, L. Xiaodong, L. Rongxing, and H. Pin-Han, "RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks," In IEEE International Conference on Communications, Beijing, pp. 1451-7, May. 2008.
-
(2008)
IEEE International Conference on Communications
, pp. 1451-1457
-
-
Chenxi, Z.1
Xiaodong, L.2
Rongxing, L.3
Pin-Han, H.4
-
38
-
-
47949086407
-
An ID-based framework achieving privacy and non-repudiation in vehicular Ad Hoc networks
-
Orlando, FL, Oct
-
J. Sun, C. Zhang, and Y. Fang, "An ID-based framework achieving privacy and non-repudiation in vehicular Ad Hoc networks," in IEEE Military Communications Conference, MILCOM, Orlando, FL, Oct. 2007, pp. 1-7.
-
(2007)
IEEE Military Communications Conference, MILCOM
, pp. 1-7
-
-
Sun, J.1
Zhang, C.2
Fang, Y.3
-
39
-
-
38649132005
-
Securing vehicular ad hoc networks
-
DOI 10.1109/ICPCA.2007.4365481, 4365481, 2007 2nd International Conference on Pervasive Computing and Applications, ICPCA'07
-
L. Xiaonan, F. Zhiyi, and S. Lijun, "Securing vehicular Ad Hoc networks," in 2nd International Conference on Pervasive Computing and Applications ICPCA, Birmingham, pp. 424-9, July. 2007. (Pubitemid 351165712)
-
(2007)
2007 2nd International Conference on Pervasive Computing and Applications, ICPCA'07
, pp. 424-429
-
-
Xiaonan, L.1
Zhiyi, F.2
Lijun, S.3
-
40
-
-
83455205813
-
CARAVAN: Providing location privacy for VANET
-
Cologne, Sept
-
K. Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K. Sezaki, "CARAVAN: Providing location privacy for VANET," in 3rd International Workshop on Vehicular ad hoc Networks, Cologne, Sept. 2006.
-
(2006)
3rd International Workshop on Vehicular ad hoc Networks
-
-
Sampigethaya, K.1
Huang, L.2
Li, M.3
Poovendran, R.4
Matsuura, K.5
Sezaki, K.6
-
41
-
-
36749076982
-
GSIS: A secure and privacy-preserving protocol for vehicular communications
-
Nov
-
L. Xiaodong, S. Xiaoting, H. Pin-Han, and S. Xuemin, "GSIS: A secure and privacy-preserving protocol for vehicular communications," IEEE Transactions on Vehicular Technology, Vol. 56, pp. 3442-56, Nov. 2007.
-
(2007)
IEEE Transactions on Vehicular Technology
, vol.56
, pp. 3442-356
-
-
Xiaodong, L.1
Xiaoting, S.2
Pin-Han, H.3
Xuemin, S.4
-
42
-
-
84858251327
-
An identity-based security framework for VANETs
-
Los Angeles, CA, Sept
-
K. Pandurang, B. Arati, and T. Wade, "An identity-based security framework for VANETs," in The Proceedings of the 3rd international workshop on Vehicular ad hoc Networks, Los Angeles, CA, Sept. 2006.
-
(2006)
The Proceedings of the 3rd international workshop on Vehicular ad hoc Networks
-
-
Pandurang, K.1
Arati, B.2
Wade, T.3
-
43
-
-
46749099079
-
A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
-
Jan
-
C.T. Li, M.S. Hwang, and Y.P. Chu, "A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks," Computer Communications, Vol. 31, pp. 2803-14, Jan. 2008.
-
(2008)
Computer Communications
, vol.31
, pp. 2803-2814
-
-
Li, C.T.1
Hwang, M.S.2
Chu, Y.P.3
-
44
-
-
34547365680
-
Privacy in VANETs using changing pseudonyms - Ideal and real
-
DOI 10.1109/VETECS.2007.519, 4212947, 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring
-
M. Gerlach, and F. Guttler, "Privacy in VANETs using changing pseudonyms -ideal and real," in IEEE 65th Vehicular Technology Conference, VTC, Dublin, pp. 2521-5, Apr. 2007. (Pubitemid 47134401)
-
(2007)
IEEE Vehicular Technology Conference
, pp. 2521-2525
-
-
Gerlach, M.1
Guttler, F.2
-
45
-
-
33646820668
-
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
-
DOI 10.1007/11593447-28, Advances in Cryptology - ASIACRYPT 2005 - 11th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
-
B. Roy, P. Barreto, B. Libert, N. McCullagh, and J.J. Quisquater, "Efficient and provably-secure identity-based signatures and signcryption from bilinear maps," in Advances in Cryptology -ASIACRYPT: Heidelberg: Springer Berlin; pp. 515-32, Dec. 2005. (Pubitemid 43763493)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS 3788
, pp. 515-532
-
-
Barreto, P.S.L.M.1
Libert, B.2
McCullagh, N.3
Quisquater, J.-J.4
-
46
-
-
57049129831
-
An efficient message authentication scheme for vehicular communications
-
Nov
-
Z. Chenxi, L. Xiaodong, L. Rongxing, H. Pin-Han, and S. Xuemin, "An efficient message authentication scheme for vehicular communications," IEEE Transactions on Vehicular Technology, Vol. 57, pp. 3357-68, Nov. 2008.
-
(2008)
IEEE Transactions on Vehicular Technology
, vol.57
, pp. 3357-3368
-
-
Chenxi, Z.1
Xiaodong, L.2
Rongxing, L.3
Pin-Han, H.4
Xuemin, S.5
-
47
-
-
24944489750
-
Enhancing wireless location privacy using silent period
-
PHY53-4, 2005 IEEE Wireless Communications and Networking Conference, WCNC 2005: Broadband Wireless for the Masses - Ready for Take-off
-
H. Leping, K. Matsuura, H. Yamane, and K. Sezaki, "Enhancing wireless location privacy using silent period," in IEEE Wireless Communications and Networking Conference, Nokia Res. Center Japan, Tokyo, Japan, pp. 1187-92, May. 2005. (Pubitemid 41311089)
-
(2005)
IEEE Wireless Communications and Networking Conference, WCNC
, vol.2
, pp. 1187-1192
-
-
Huang, L.1
Matsuura, K.2
Yamanet, H.3
Sezaki, K.4
-
48
-
-
50149117254
-
Modeling mobility for vehicular ad-hoc networks
-
Philadelphia, PA, Oct
-
S. Amit Kumar, and B.J. David, "Modeling mobility for vehicular ad-hoc networks," in Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks, Philadelphia, PA, Oct. 2004.
-
(2004)
Proceedings of the 1st ACM International Workshop on Vehicular ad hoc Networks
-
-
Amit Kumar, S.1
David, B.J.2
|