메뉴 건너뛰기




Volumn , Issue , 2012, Pages 560-565

Joint privacy and reputation assurance for VANETs

Author keywords

Privacy Protection; Reputation; VANETs

Indexed keywords

ANALYSIS AND SIMULATION; DISCRETIZATION ALGORITHMS; NETWORK TOPOLOGY; NODE MOBILITY; PARTIALLY BLIND SIGNATURES; PRIVACY PRESERVING; PRIVACY PROTECTION; REPUTATION; REPUTATION MANAGEMENT; VANETS;

EID: 84871999854     PISSN: 15503607     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2012.6363884     Document Type: Conference Paper
Times cited : (5)

References (16)
  • 1
    • 84892911808 scopus 로고    scopus 로고
    • Security of vehicular ad hoc networks in intelligent transportation systems
    • Y. Z. Ming-Tuo Zhou, Laurence T. Yang, Ed., ed: Nova Publishers
    • Z. Li, Z. Wang, and C. Chigan, "Security of vehicular ad hoc networks in intelligent transportation systems," in Wireless Technologies in Intelligent Transportation Systems, Y. Z. Ming-Tuo Zhou, Laurence T. Yang, Ed., ed: Nova Publishers, 2011, pp. 133-174.
    • (2011) Wireless Technologies in Intelligent Transportation Systems , pp. 133-174
    • Li, Z.1    Wang, Z.2    Chigan, C.3
  • 2
    • 71649094416 scopus 로고    scopus 로고
    • A survey of attack and defense techniques for reputation systems
    • Dec.
    • K. Hoffman, D. Zage, and C. Nita-Rotaru, "A survey of attack and defense techniques for reputation systems," Acm Computing Surveys, vol. 42, Dec 2009.
    • (2009) Acm Computing Surveys , vol.42
    • Hoffman, K.1    Zage, D.2    Nita-Rotaru, C.3
  • 8
    • 79959208028 scopus 로고    scopus 로고
    • RAMV: Ensuring resource-aware message verification in VANETs
    • Jul.
    • Z. Li and C. Chigan, "RAMV: ensuring resource-aware message verification in VANETs," Security and Communication Networks, vol. 4, pp. 771-784, Jul 2011.
    • (2011) Security and Communication Networks , vol.4 , pp. 771-784
    • Li, Z.1    Chigan, C.2
  • 9
    • 39049116456 scopus 로고    scopus 로고
    • A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
    • Y. L. Sun, Z. Han, W. Yu, and K. J. R. Liu, "A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks," in Proc. IEEE INFOCOM 2006, 2006, pp. 1-13.
    • (2006) Proc. IEEE INFOCOM 2006 , pp. 1-13
    • Sun, Y.L.1    Han, Z.2    Yu, W.3    Liu, K.J.R.4
  • 15
    • 79957593169 scopus 로고    scopus 로고
    • September 02
    • ISI. (2011, September 02). The Network Simulator - ns-2. Available: http://www.isi.edu/nsnam/ns/index.html
    • (2011) The Network Simulator - ns-2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.