-
1
-
-
57449086537
-
Secure vehicular communication systems: Implementation, performance, and research challenges
-
F. Kargl, P. Papadimitratos, L. Buttyan, M. Muter, E. Schoch, B. Wiedersheim, T.-V. Thong; G. Calandriello, A. Held, A. Kung, and J.-P Hubaux, "Secure vehicular communication systems: implementation, performance, and research challenges, " IEEE Communications Magazine, Vol. 46, Issue 6, pp. 110-118, 2008.
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.6
, pp. 110-118
-
-
Kargl, F.1
Papadimitratos, P.2
Buttyan, L.3
Muter, M.4
Schoch, E.5
Wiedersheim, B.6
Thong, T.-V.7
Calandriello, G.8
Held, A.9
Kung, A.10
Hubaux, J.-P.11
-
2
-
-
42649121690
-
Security in vehicular ad hoc networks
-
X. Lin, R. Lu, C. Zhang, H. Zhu, P.-H. Ho, and X. Shen, "Security in vehicular ad hoc networks, " IEEE Communications Magazine, Vol. 46, Issue 4, pp. 88 - 95, 2008.
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.4
, pp. 88-95
-
-
Lin, X.1
Lu, R.2
Zhang, C.3
Zhu, H.4
Ho, P.-H.5
Shen, X.6
-
3
-
-
70849118349
-
Privacy requirements in vehicular communication systems
-
F. Schaub, Z. Ma, and F. Kargl, "Privacy Requirements in Vehicular Communication Systems, " in Proceedings of the International Conference on Computational Science and Engineering, Vol.3, pp. 139-145, 2009.
-
(2009)
Proceedings of the International Conference on Computational Science and Engineering
, vol.3
, pp. 139-145
-
-
Schaub, F.1
Ma, Z.2
Kargl, F.3
-
4
-
-
33745948310
-
The security of vehicular ad hoc networks
-
DOI 10.1145/1102219.1102223, SASN'05 - Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks
-
M. Raya and J.-P. Hubaux, "The security of Vehicular Ad Hoc Networks, " in proceedings of the Third ACM Workshop on Security of Ad Hoc and Sensor Networks, Alexandria, VA, USA, pp. 11-21, 2005. (Pubitemid 44059925)
-
(2005)
SASN'05 - Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks
, vol.2005
, pp. 11-21
-
-
Raya, M.1
Hubaux, J.-P.2
-
6
-
-
66149136922
-
Trustworthy privacy-preserving car-generated announcements in vehicular ad hoc Networks
-
V. Daza, J. Domingo-Ferrer, F. Sebe, and A. Viejo, "Trustworthy privacy-preserving car-generated announcements in vehicular ad hoc Networks, " IEEE Transactions on Vehicular Technology, Vol 58, Issue 4, pp. 1876-1886, 2008.
-
(2008)
IEEE Transactions on Vehicular Technology
, vol.58
, Issue.4
, pp. 1876-1886
-
-
Daza, V.1
Domingo-Ferrer, J.2
Sebe, F.3
Viejo, A.4
-
7
-
-
77249157951
-
Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications
-
Q. Wu, J. Domingo-Ferrer and U. Gonzalez-Nicolas, "Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications, " IEEE Transactions on Vehicular Technology, Vol 59, Issue 2, pp. 559-573, 2010.
-
(2010)
IEEE Transactions on Vehicular Technology
, vol.59
, Issue.2
, pp. 559-573
-
-
Wu, Q.1
Domingo-Ferrer, J.2
Gonzalez-Nicolas, U.3
-
8
-
-
37849048533
-
Efficient and robust pseudonymous authentication in VANET
-
G. Calandriello, P. Papadimitratos, J.-P. Hubaux and A. Lioy, "Efficient and robust pseudonymous authentication in VANET, " Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks, pp. 19-28, 2007.
-
(2007)
Proceedings of the Fourth ACM International Workshop on Vehicular Ad Hoc Networks
, pp. 19-28
-
-
Calandriello, G.1
Papadimitratos, P.2
Hubaux, J.-P.3
Lioy, A.4
-
9
-
-
77950436737
-
A secure anonymous key mechanism for privacy protection in VANET
-
C. Lai, H. Chang, C.- C. Lu, "A secure anonymous key mechanism for privacy protection in VANET, " Conference on Intelligent Transport Systems Telecommunications, pp. 635-640, 2009.
-
(2009)
Conference on Intelligent Transport Systems Telecommunications
, pp. 635-640
-
-
Lai, C.1
Chang, H.2
Lu, C.-.C.3
-
10
-
-
67650668245
-
Pairing-based message authentication scheme with privacy protection in vehicular ad hoc networks
-
Yilan, Taiwan
-
C.-I. Fan, R.-H. Hsu, and C.-H. Tseng, "Pairing-based message authentication scheme with privacy protection in vehicular ad hoc networks, " in Proceedings of the International Conference on Mobile Technology, Applications, and Systems, Yilan, Taiwan, 2008.
-
(2008)
Proceedings of the International Conference on Mobile Technology, Applications, and Systems
-
-
Fan, C.-I.1
Hsu, R.-H.2
Tseng, C.-H.3
-
11
-
-
70350767365
-
Ensuring privacy in vehicular communication
-
R. Peplow, D.S. Dawoud, and J. van der Merwe, "Ensuring privacy in vehicular communication, " in Proceedings of the 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, pp. 610-614, 2009.
-
(2009)
Proceedings of the 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology
, pp. 610-614
-
-
Peplow, R.1
Dawoud, D.S.2
Van Der Merwe, J.3
-
12
-
-
84856175842
-
ECPP-Efficient conditional privacy preservation protocol for secure vehicular communications
-
R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, "ECPP-Efficient conditional privacy preservation protocol for secure vehicular communications, " in Proceedings of the 27th Conference on Computer Communications, pp. 1229-1237, 2008.
-
(2008)
Proceedings of the 27th Conference on Computer Communications
, pp. 1229-1237
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Ho, P.-H.4
Shen, X.5
-
13
-
-
58149123333
-
Time efficient and secure vehicular communications with privacy preserving authentication
-
X. Lin, X. Sun, X. Wang, C. Zhang, P.-H Ho, and X. Shen, "Time efficient and secure vehicular communications with privacy preserving authentication, " IEEE Transactions on Wireless Communications, Vol 7, Issue 12, pp. 4987-4998, 2008.
-
(2008)
IEEE Transactions on Wireless Communications
, vol.7
, Issue.12
, pp. 4987-4998
-
-
Lin, X.1
Sun, X.2
Wang, X.3
Zhang, C.4
Ho, P.-H.5
Shen, X.6
-
14
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing, " SIAM Journal on Computing, Vol. 32, Issue 3, pp. 586-615, 2003.
-
(2003)
SIAM Journal on Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
|