-
1
-
-
3242814357
-
Moderately hard, memory-bound functions
-
In: Proc. of the 10th Annual Network and Distributed System Security Symposium
-
Abadi, M., Burrows, M., Manasse, M., Wobber, T., 2003. Moderately hard, memory-bound functions. In: Proc. of the 10th Annual Network and Distributed System Security Symposium, pp. 25-39.
-
(2003)
, pp. 25-39
-
-
Abadi, M.1
Burrows, M.2
Manasse, M.3
Wobber, T.4
-
2
-
-
44949112970
-
Cross-layer privacy enhancement and non-repudiation in vehicular communication
-
In: Proc. of the 4th Workshop on Mobile Ad-Hoc Networks (WMAN).
-
Armknecht, F., Festag, A., Westhoff, D., Zeng, K., 2007. Cross-layer privacy enhancement and non-repudiation in vehicular communication. In: Proc. of the 4th Workshop on Mobile Ad-Hoc Networks (WMAN).
-
(2007)
-
-
Armknecht, F.1
Festag, A.2
Westhoff, D.3
Zeng, K.4
-
3
-
-
1342281463
-
The threat of intelligent collisions
-
Blum J., Eskandarian A. The threat of intelligent collisions. IT Professional 2004, 6:8-13.
-
(2004)
IT Professional
, vol.6
, pp. 8-13
-
-
Blum, J.1
Eskandarian, A.2
-
6
-
-
84879543426
-
Exponential Memory-Bound Functions for Proof of Work Protocols
-
Technical Report A/370/CRI version 2. Technical Report
-
Coelho, F., 2005. Exponential Memory-Bound Functions for Proof of Work Protocols. Technical Report A/370/CRI version 2. Technical Report.
-
(2005)
-
-
Coelho, F.1
-
8
-
-
66149136922
-
Trustworthy privacy-preserving car-generated announcements in vehicular ad hoc networks
-
Daza V., Domingo-Ferrer J., Sebé F., Viejo A. Trustworthy privacy-preserving car-generated announcements in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology 2008, 58:1876-1886.
-
(2008)
IEEE Transactions on Vehicular Technology
, vol.58
, pp. 1876-1886
-
-
Daza, V.1
Domingo-Ferrer, J.2
Sebé, F.3
Viejo, A.4
-
12
-
-
85029890799
-
EVITA: E-safety Vehicle Intrusion Protected Applications. FP7-ICT-2007 of the European Community
-
EVITA, 2007. Project EVITA: E-safety Vehicle Intrusion Protected Applications. FP7-ICT-2007 of the European Community. <>. http://www.evita-project.org.
-
(2007)
EVITA, Project
-
-
-
14
-
-
50049097869
-
An infrastructure for gaining trust in context information
-
In: Proc. of IEEE SECURECOMM Workshop on The Value of Security through Collaboration
-
Fransen, F., Lachmund, S., Olk, E., Bussard, L., 2006. An infrastructure for gaining trust in context information. In: Proc. of IEEE SECURECOMM Workshop on The Value of Security through Collaboration.
-
(2006)
-
-
Fransen, F.1
Lachmund, S.2
Olk, E.3
Bussard, L.4
-
15
-
-
14944372809
-
Detecting and correcting malicious data in vanets
-
ACM New York, NY, USA
-
Golle P., Greene D., Staddon J. Detecting and correcting malicious data in vanets. Proc. of the 1st ACM Int. Workshop on Vehicular Ad Hoc Networks 2004, 29-37. ACM New York, NY, USA.
-
(2004)
Proc. of the 1st ACM Int. Workshop on Vehicular Ad Hoc Networks
, pp. 29-37
-
-
Golle, P.1
Greene, D.2
Staddon, J.3
-
18
-
-
0002459783
-
Client puzzles: A cryptographic defense against connection depletion attacks
-
In: Proc. of the Networks and Distributed Security Systems, California, USA
-
Juels, A., Brainard, J., 1999. Client puzzles: a cryptographic defense against connection depletion attacks. In: Proc. of the Networks and Distributed Security Systems, California, USA, pp. 151-165.
-
(1999)
, pp. 151-165
-
-
Juels, A.1
Brainard, J.2
-
19
-
-
50249147682
-
Illusion attack on vanet applications-a message plausibility problem
-
In: Proc. of the IEEE Globecom Workshops
-
Lo, N., Tsai, H., 2007. Illusion attack on vanet applications-a message plausibility problem. In: Proc. of the IEEE Globecom Workshops, pp. 1-8.
-
(2007)
, pp. 1-8
-
-
Lo, N.1
Tsai, H.2
-
20
-
-
59249090296
-
Data aggregation and roadside unit placement for a vanet traffic information system
-
ACM
-
Lochert C., Scheuermann B., Wewetzer C., Luebke A., Mauve M. Data aggregation and roadside unit placement for a vanet traffic information system. Proc. of the 5th ACM Int. Workshop on VehiculAr Inter-NETworking (VANET '08) 2008, 58-65. ACM.
-
(2008)
Proc. of the 5th ACM Int. Workshop on VehiculAr Inter-NETworking (VANET '08)
, pp. 58-65
-
-
Lochert, C.1
Scheuermann, B.2
Wewetzer, C.3
Luebke, A.4
Mauve, M.5
-
21
-
-
84856175842
-
Ecpp: efficient conditional privacy preservation protocol for secure vehicular communications
-
IEEE
-
Lu R., Lin X., Zhu H., Ho P.H., Shen X. Ecpp: efficient conditional privacy preservation protocol for secure vehicular communications. Proc. of the 27th Conference on Computer Communications 2008, 1229-1237. IEEE.
-
(2008)
Proc. of the 27th Conference on Computer Communications
, pp. 1229-1237
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Ho, P.H.4
Shen, X.5
-
24
-
-
34548179912
-
Enhancing the security of local danger warnings in vanets - a simulative analysis of voting schemes
-
In: Proc. of the 2nd Int. Conf. on Availability, Reliability and Security
-
Ostermaier, B., Otzer, F.D., Strassberger, M., 2007. Enhancing the security of local danger warnings in vanets - a simulative analysis of voting schemes. In: Proc. of the 2nd Int. Conf. on Availability, Reliability and Security, pp. 422-431.
-
(2007)
, pp. 422-431
-
-
Ostermaier, B.1
Otzer, F.D.2
Strassberger, M.3
-
25
-
-
57449105235
-
Secure vehicular communication systems: design and architecture
-
Papadimitratos P., Buttyán L., Holczer T., Schoch E., Freudiger J., Raya M., Ma Z., Kargl F., Kung A., Hubaux J.P. Secure vehicular communication systems: design and architecture. IEEE Communications Magazine 2008, 46:100-109.
-
(2008)
IEEE Communications Magazine
, vol.46
, pp. 100-109
-
-
Papadimitratos, P.1
Buttyán, L.2
Holczer, T.3
Schoch, E.4
Freudiger, J.5
Raya, M.6
Ma, Z.7
Kargl, F.8
Kung, A.9
Hubaux, J.P.10
-
28
-
-
35348977820
-
Eviction of misbehaving and faulty nodes in vehicular networks
-
Raya M., Papadimitratos P., Aad I., Jungels D., Hubaux J.P. Eviction of misbehaving and faulty nodes in vehicular networks. IEEE Journal on Selected Areas in Communications 2007, 25.
-
(2007)
IEEE Journal on Selected Areas in Communications
, pp. 25
-
-
Raya, M.1
Papadimitratos, P.2
Aad, I.3
Jungels, D.4
Hubaux, J.P.5
-
29
-
-
77953899990
-
Tinyness: AN overview of tea and related ciphers
-
Russell, M., 2004. Tinyness: an overview of tea and related ciphers. <>. http://www-users.cs.york.ac.uk/matthew/TEA/TEA.html.
-
(2004)
-
-
Russell, M.1
-
30
-
-
84859108765
-
-
Draft SAE J2735. Dedicated Short Range Communications (DSRC) Message Set Dictionary rev 29
-
SAE, I., 2009a. Draft SAE J2735. Dedicated Short Range Communications (DSRC) Message Set Dictionary rev 29.
-
(2009)
-
-
SAE, I.1
-
31
-
-
84859108766
-
-
J2540-2. ITIS Phrase Lists
-
SAE, I., 2009b. J2540-2. ITIS Phrase Lists.
-
(2009)
-
-
SAE, I.1
-
34
-
-
84859106202
-
Security in automotive bus systems
-
In: Proc. of the Workshop on Embedded IT-Security in Cars (escar)
-
Wolf, M., Weimerskirch, A., Paar, C., 2004. Security in automotive bus systems. In: Proc. of the Workshop on Embedded IT-Security in Cars (escar), pp. 1-13.
-
(2004)
, pp. 1-13
-
-
Wolf, M.1
Weimerskirch, A.2
Paar, C.3
-
35
-
-
77249157951
-
Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications
-
Wu Q., Domingo-Ferrer J., Gonzalez-Nicolas U. Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications. IEEE Transactions on Vehicular Technology 2010, 59:559-573.
-
(2010)
IEEE Transactions on Vehicular Technology
, vol.59
, pp. 559-573
-
-
Wu, Q.1
Domingo-Ferrer, J.2
Gonzalez-Nicolas, U.3
-
36
-
-
78651247819
-
Time and location-critical emergency message dissemination for vehicular ad-hoc networks
-
Zhuang Y., Pan J., Luo Y., Cai L. Time and location-critical emergency message dissemination for vehicular ad-hoc networks. IEEE Journal on Selected Areas in Communications 2011, 29:187-196.
-
(2011)
IEEE Journal on Selected Areas in Communications
, vol.29
, pp. 187-196
-
-
Zhuang, Y.1
Pan, J.2
Luo, Y.3
Cai, L.4
|