-
1
-
-
80052406758
-
ID-based safety message authentication for security and trust in vehicular networks
-
Minneapolis, MN, Jun
-
S. Biswas, J. Misic, and V. Misic, "ID-based safety message authentication for security and trust in vehicular networks," in Proc. 31st ICDCSW, Minneapolis, MN, Jun. 2011, pp. 323-331.
-
(2011)
Proc. 31st ICDCSW
, pp. 323-331
-
-
Biswas, S.1
Misic, J.2
Misic, V.3
-
2
-
-
84873921215
-
Brute-force attack
-
[Online]. Available
-
"Brute-force attack," Wikipedia. [Online]. Available: http://en.wikipedia. org/wiki/Brute-force-attack
-
Wikipedia
-
-
-
3
-
-
81055137605
-
Short-lived key management for secure communications in VANETs
-
Russia, Aug
-
S. Busanelli, G. Ferrari, and L. Veltri, "Short-lived key management for secure communications in VANETs," in Proc. ITST, St. Petersburg, Russia, Aug. 2011, pp. 613-618.
-
(2011)
Proc. ITST, St. Petersburg
, pp. 613-618
-
-
Busanelli, S.1
Ferrari, G.2
Veltri, L.3
-
4
-
-
38149010558
-
On the effectiveness of changing pseudonyms to provide location privacy in VANETs
-
Cambridge, U.K Jul
-
L. Buttyan, T. Holczer, and I. Vajda, "On the effectiveness of changing pseudonyms to provide location privacy in VANETs," in Proc. ESAS, Cambridge, U.K., Jul. 2007, pp. 129-141.
-
(2007)
Proc. ESAS
, pp. 129-141
-
-
Buttyan, L.1
Holczer, T.2
Vajda, I.3
-
5
-
-
37849048533
-
Efficient and robust pseudonymous authentication in VANET
-
Montreal, QC, Canada, Sep
-
G. Calandriello, P. Papadimitratos, A. Lioy, and J. P. Hubaux, "Efficient and robust pseudonymous authentication in VANET," in Proc. ACM Mobicom, Montreal, QC, Canada, Sep. 2007, pp. 19-28.
-
(2007)
Proc. ACM Mobicom
, pp. 19-28
-
-
Calandriello, G.1
Papadimitratos, P.2
Lioy, A.3
Hubaux, J.P.4
-
6
-
-
84873909797
-
-
Sumo-Simulation of Urban Mobility, Inst. of Transp. Res., German Aerosp. Centre, Berlin, Germany. [Online]. Available
-
Centre for Appl. Inf. (ZAIK). (2011). Sumo-Simulation of Urban Mobility, Inst. of Transp. Res., German Aerosp. Centre, Berlin, Germany. [Online]. Available: http://sumo.sourceforge.net/
-
(2011)
Centre for Appl. Inf. (ZAIK)
-
-
-
7
-
-
85024290278
-
Group signatures
-
D. Chaum and E. van Heyst, "Group signatures," in Proc. EUROCRYPT, 1991, vol. 547, pp. 257-265.
-
(1991)
Proc. EUROCRYPT
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
8
-
-
77957259997
-
SPECS: Secure and privacy enhancing communications schemes for VANETs
-
Mar.
-
T. W. Chim, S. M. Yiu, L. Hui, and V. Li, "SPECS: Secure and privacy enhancing communications schemes for VANETs," Ad Hoc Netw., vol. 9, no. 2, pp. 189-203, Mar. 2011.
-
(2011)
Ad Hoc Netw.
, vol.9
, Issue.2
, pp. 189-203
-
-
Chim, T.W.1
Yiu, S.M.2
Hui, L.3
Li, V.4
-
9
-
-
62949186729
-
Service discovery and service access in wireless vehicular networks
-
E. Coronado and S. Cherkaoui, "Service discovery and service access in wireless vehicular networks," in Proc. IEEE GLOBECOM Workshops, 2008, pp. 1-6.
-
(2008)
Proc. IEEE GLOBECOM Workshops
, pp. 1-6
-
-
Coronado, E.1
Cherkaoui, S.2
-
10
-
-
84873935169
-
-
Crypto++ 5.6.1 Library Apr 2011. [Online]. Available
-
Crypto++ 5.6.1 Library, Apr. 2011. [Online]. Available: http://www. cryptopp.com/
-
-
-
-
11
-
-
79951900587
-
EP2DF: An efficient privacy-preserving data-forwarding scheme for service-oriented vehicular ad hoc networks
-
Feb.
-
X. Dong, L. Wei, H. Zhu, Z. Cao, and L. Wang, "EP2DF: An efficient privacy-preserving data-forwarding scheme for service-oriented vehicular ad hoc networks," IEEE Trans. Veh. Technol., vol. 60, no. 2, pp. 580-591, Feb. 2011.
-
(2011)
IEEE Trans. Veh. Technol
, vol.60
, Issue.2
, pp. 580-591
-
-
Dong, X.1
Wei, L.2
Zhu, H.3
Cao, Z.4
Wang, L.5
-
12
-
-
78650085090
-
A light architecture for opportunistic vehicle-to-infrastructure communications
-
Turkey, Oct
-
F. El Ali and B. Ducourthial, "A light architecture for opportunistic vehicle-to-infrastructure communications," in Proc. MobiWac, Bodrum, Turkey, Oct. 2010, pp. 60-67.
-
(2010)
Proc. MobiWac, Bodrum
, pp. 60-67
-
-
El Ali, F.1
Ducourthial, B.2
-
13
-
-
74949136373
-
Mix zones for location privacy in vehicular networks
-
presented at the Vancouver, BC, Canada Aug LCA-CONF-2007-016
-
J. Freudiger, M. Raya,M. Feleghhazi, P. Papadimitratos, and J. P. Hubaux, "Mix zones for location privacy in vehicular networks," presented at the Int. Workshop Wireless Netw. Intell. Transp. Syst., Vancouver, BC, Canada, Aug. 2007 LCA-CONF-2007-016.
-
(2007)
Int. Workshop Wireless Netw. Intell. Transp. Syst.
-
-
Freudiger, J.1
Rayam. Feleghhazi, M.2
Papadimitratos, P.3
Hubaux, J.P.4
-
14
-
-
84873934972
-
-
GeoNet Project. [Online] Available
-
GeoNet Project. [Online]. Available: http://www.geonet-project.eu
-
-
-
-
15
-
-
79951975426
-
A distributed key management framework with cooperative message authentication in VANETs
-
Mar.
-
Y. Hao, Y. Cheng, C. Zhou, and W. Song, "A distributed key management framework with cooperative message authentication in VANETs," IEEE J. Sel. Areas Commun., vol. 29, no. 3, pp. 616-629, Mar. 2011.
-
(2011)
IEEE J. Sel. Areas Commun
, vol.29
, Issue.3
, pp. 616-629
-
-
Hao, Y.1
Cheng, Y.2
Zhou, C.3
Song, W.4
-
16
-
-
24944489750
-
Enhancing wireless location privacy using silent period
-
New Orleans, LA
-
L. Huang, K. Matsuura, H. Yamane, and K. Sezaki, "Enhancing wireless location privacy using silent period," in Proc. IEEE WCNC, New Orleans, LA, 2005, pp. 1187-1192.
-
(2005)
Proc. IEEE WCNC
, pp. 1187-1192
-
-
Huang, L.1
Matsuura, K.2
Yamane, H.3
Sezaki, K.4
-
17
-
-
78751657441
-
ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks
-
Jan.
-
J. L. Huang, L. Y. Yeh, and H. Y. Chien, "ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks," IEEE Trans. Veh. Technol., vol. 60, no. 1, pp. 248-262, Jan. 2011.
-
(2011)
IEEE Trans. Veh. Technol
, vol.60
, Issue.1
, pp. 248-262
-
-
Huang, J.L.1
Yeh, L.Y.2
Chien, H.Y.3
-
18
-
-
84873910041
-
-
ITSSv6 Project. [Online]. Available
-
ITSSv6 Project. [Online]. Available: http://www.lara.prd.fr/projects/ itssv6
-
-
-
-
19
-
-
84873918929
-
-
"Key size," Wikipedia. [Online]. Available
-
"Key size," Wikipedia. [Online]. Available: http://en.wikipedia.org/wiki/Key-size
-
-
-
-
20
-
-
33745725717
-
An anonymous communication technique using dummies for location-based services
-
Jul
-
H. Kido, Y. Yanagisawa, and T. Satoh, "An anonymous communication technique using dummies for location-based services," in Proc. ICPS, Santorini, Greece, Jul. 2005, pp. 88-97.
-
(2005)
Proc. ICPS, Santorini, Greece
, pp. 88-97
-
-
Kido, H.1
Yanagisawa, Y.2
Satoh, T.3
-
21
-
-
33749643165
-
Threats to security in DSRC/WAVE
-
C. Laurendeau and M. Barbeau, "Threats to security in DSRC/WAVE," in Proc. ADHOC-NOW, 2006, vol. 4104, pp. 266-279.
-
(2006)
Proc. ADHOC-NOW
, vol.4104
, pp. 266-279
-
-
Laurendeau, C.1
Barbeau, M.2
-
22
-
-
46749099079
-
A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
-
Jul
-
C. T. Li, M. S. Hwang, and Y. P. Chu, "A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks," Comput. Commun., vol. 31, no. 12, pp. 2803-2814, Jul. 2008.
-
(2008)
Comput. Commun
, vol.31
, Issue.12
, pp. 2803-2814
-
-
Li, C.T.1
Hwang, M.S.2
Chu, Y.P.3
-
23
-
-
59249090296
-
Data aggregation and roadside unit placement for a VANET traffic information system
-
San Francisco, CA, Sep
-
C. Lochert, B. Scheuermann, C. Wewetzer, A. Luebke, and M. Mauve, "Data aggregation and roadside unit placement for a VANET traffic information system," in Proc. 5th ACM Int. Workshop VANET, San Francisco, CA, Sep. 2008, pp. 58-65.
-
(2008)
Proc. 5th ACM Int. Workshop VANET
, pp. 58-65
-
-
Lochert, C.1
Scheuermann, B.2
Wewetzer, C.3
Luebke, A.4
Mauve, M.5
-
24
-
-
58149135996
-
Pseudonym-on-demand: A new pseudonym refill strategy for vehicular communications
-
Calgary, AB, Canada, Sep
-
Z. Ma, F. Kargl, and M. Weber, "Pseudonym-on-demand: A new pseudonym refill strategy for vehicular communications," in Proc. IEEE 68th Veh. Technol. Conf., Calgary, AB, Canada, Sep. 2008, pp. 1-5.
-
(2008)
Proc. IEEE 68th Veh. Technol. Conf.
, pp. 1-5
-
-
Ma, Z.1
Kargl, F.2
Weber, M.3
-
25
-
-
84856548328
-
ROAMER: Roadside Units as message routers in VANETs
-
May
-
K. Mershad, H. Artail, and M. Gerla, "ROAMER: Roadside Units as message routers in VANETs," Ad Hoc Netw., vol. 10, no. 3, pp. 479-496, May 2012.
-
(2012)
Ad Hoc Netw
, vol.10
, Issue.3
, pp. 479-496
-
-
Mershad, K.1
Artail, H.2
Gerla, M.3
-
26
-
-
84864248417
-
SCORE: Data scheduling at roadside units in vehicle ad hoc networks
-
Lebanon, Apr
-
K. Mershad and H. Artail, "SCORE: Data scheduling at roadside units in vehicle ad hoc networks," in Proc. ICT, Jounieh, Lebanon, Apr. 2012, pp. 1-6.
-
(2012)
Proc. ICT, Jounieh
, pp. 1-6
-
-
Mershad, K.1
Artail, H.2
-
27
-
-
67049134643
-
ABSRP-A service discovery approach for vehicular ad hoc networks
-
Yilan, Taiwan, Dec
-
B. Mohandas, A. Nayak, K. Naik, and N. Goel, "ABSRP-A service discovery approach for vehicular ad hoc networks," in Proc. IEEE 3rd APSCC, Yilan, Taiwan, Dec. 2008, pp. 1590-1594.
-
(2008)
Proc. IEEE 3rd APSCC
, pp. 1590-1594
-
-
Mohandas, B.1
Nayak, A.2
Naik, K.3
Goel, N.4
-
28
-
-
83655202567
-
A novel sender authentication scheme based on hash chain for vehicular ad hoc networks
-
Malaysia, Sep
-
N. V. Vighnesh, N. Kavita, S. R. Urs, and S. Sampalli, "A novel sender authentication scheme based on hash chain for vehicular ad hoc networks," in Proc. IEEE ISWTA, Langkawi, Malaysia, Sep. 2011, pp. 96-101.
-
(2011)
Proc. IEEE ISWTA, Langkawi
, pp. 96-101
-
-
Vighnesh, N.V.1
Kavita, N.2
Urs, S.R.3
Sampalli, S.4
-
29
-
-
57449105235
-
Secure vehicular communication systems: Design and architecture
-
Nov
-
P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung, and J. P. Hubaux, "Secure vehicular communication systems: Design and architecture," IEEE Commun. Mag., vol. 46, no. 11, pp. 100-109, Nov. 2008.
-
(2008)
IEEE Commun. Mag
, vol.46
, Issue.11
, pp. 100-109
-
-
Papadimitratos, P.1
Buttyan, L.2
Holczer, T.3
Schoch, E.4
Freudiger, J.5
Raya, M.6
Ma, Z.7
Kargl, F.8
Kung, A.9
Hubaux, J.P.10
-
30
-
-
84868349605
-
Stronger key derivation via sequential memory-hard functions
-
May
-
C. Percival, "Stronger key derivation via sequential memory-hard functions," in Proc. BSDCan, Ottawa, ON, Canada, May 2009, pp. 1-16.
-
(2009)
Proc. BSDCan, Ottawa, ON, Canada
, pp. 1-16
-
-
Percival, C.1
-
31
-
-
79951473393
-
Analysis of authentication overhead in vehicular networks
-
Hungary, Oct
-
J. Petit and Z. Mammeri, "Analysis of authentication overhead in vehicular networks," in Proc. WMNC, Budapest, Hungary, Oct. 2010, pp. 1-6.
-
(2010)
Proc. WMNC, Budapest
, pp. 1-6
-
-
Petit, J.1
Mammeri, Z.2
-
32
-
-
14844301983
-
-
RSA Lab., Cambridge, MA Sep
-
B. Kaliski, "PKCS# 5: Password-Based Cryptography Specification Version 2," RSA Lab., Cambridge, MA, 2898, Sep. 2000.
-
(2000)
PKCS# 5: Password-Based Cryptography Specification Version 2
, vol.2898
-
-
Kaliski, B.1
-
33
-
-
33745948310
-
The security of vehicular ad hoc networks
-
Nov
-
M. Raya and J. P. Hubaux, "The security of vehicular ad hoc networks," in Proc. SASN, Alexandria, VA, Nov. 2005, pp. 11-21.
-
(2005)
Proc. SASN, Alexandria, VA
, pp. 11-21
-
-
Raya, M.1
Hubaux, J.P.2
-
34
-
-
35348977820
-
Eviction of misbehaving and faulty nodes in vehicular networks
-
Oct
-
M. Raya, P. Papadimitratos, I. Aad, D. Jungels, and J. P. Hubaux, "Eviction of misbehaving and faulty nodes in vehicular networks," IEEE J. Sel. Areas Commun., vol. 25, no. 8, pp. 1557-1568, Oct. 2007.
-
(2007)
IEEE J. Sel. Areas Commun
, vol.25
, Issue.8
, pp. 1557-1568
-
-
Raya, M.1
Papadimitratos, P.2
Aad, I.3
Jungels, D.4
Hubaux, J.P.5
-
35
-
-
79959852755
-
Analytical comparison of cryptographic techniques for resource-constrained wireless security
-
Jul
-
M. Razvi Doomun and K. M. S. Soyjaudah, "Analytical comparison of cryptographic techniques for resource-constrained wireless security," Int. J. Netw. Sec., vol. 9, no. 1, pp. 82-94, Jul. 2009.
-
(2009)
Int. J. Netw. Sec
, vol.9
, Issue.1
, pp. 82-94
-
-
Razvi Doomun, M.1
Soyjaudah, K.M.S.2
-
36
-
-
84873922802
-
-
SafeSpot Project. [Online] Available
-
SafeSpot Project. [Online]. Available: http://www.safespot-eu.org/
-
-
-
-
37
-
-
35349016950
-
AMOEBA: Robust location privacy scheme for VANET
-
Oct
-
K. Sampigethava, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K. Sezaki, "AMOEBA: Robust location privacy scheme for VANET," IEEE J. Sel. Areas Commun., vol. 25, no. 8, pp. 1569-1589, Oct. 2007.
-
(2007)
IEEE J. Sel. Areas Commun
, vol.25
, Issue.8
, pp. 1569-1589
-
-
Sampigethava, K.1
Huang, L.2
Li, M.3
Poovendran, R.4
Matsuura, K.5
Sezaki, K.6
-
38
-
-
84873895457
-
-
SeVeCom Project. [Online] Available
-
SeVeCom Project. [Online]. Available: http://www.sevecom.org/
-
-
-
-
39
-
-
77955385286
-
Roadside units deployment for efficient short-time certificate updating in VANETs
-
South Africa, May
-
Y. Sun, X. Lin, R. Lu, X. Shen, and J. Su, "Roadside units deployment for efficient short-time certificate updating in VANETs," in Proc. IEEE ICC, Cape Town, South Africa, May 2010, pp. 1-5.
-
(2010)
Proc. IEEE ICC, Cape Town
, pp. 1-5
-
-
Sun, Y.1
Lin, X.2
Lu, R.3
Shen, X.4
Su, J.5
-
40
-
-
74149086091
-
Planning roadside infrastructure for information dissemination in intelligent transportation systems
-
Mar.
-
O. Trullols, M. Fiore, C. Casetti, C. Chiasserini, and J. Ordinas, "Planning roadside infrastructure for information dissemination in intelligent transportation systems," Comput. Commun., vol. 33, no. 4, pp. 432-442, Mar. 2010.
-
(2010)
Comput. Commun
, vol.33
, Issue.4
, pp. 432-442
-
-
Trullols, O.1
Fiore, M.2
Casetti, C.3
Chiasserini, C.4
Ordinas, J.5
-
41
-
-
33748564921
-
A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms
-
Dec
-
C. Xenakis, N. Laoutaris, L. Merakos, and I. Stavrakakis, "A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms," Comput. Netw., vol. 50, no. 17, pp. 3225-3241, Dec. 2006.
-
(2006)
Comput. Netw
, vol.50
, Issue.17
, pp. 3225-3241
-
-
Xenakis, C.1
Laoutaris, N.2
Merakos, L.3
Stavrakakis, I.4
-
42
-
-
70350330400
-
Security in service-oriented vehicular networks
-
Aug
-
H. Zhu, R. Lu, X. Shen, and X. Lin, "Security in service-oriented vehicular networks," IEEE Wireless Commun., vol. 16, no. 4, pp. 16-22, Aug. 2009.
-
(2009)
IEEE Wireless Commun
, vol.16
, Issue.4
, pp. 16-22
-
-
Zhu, H.1
Lu, R.2
Shen, X.3
Lin, X.4
|