-
1
-
-
84857921504
-
Vehicular networking: a survey and tutorial on requirements, architectures, challenges, standards and solutions
-
Karagiannis G, Altintas O, Ekici E, et al. Vehicular networking: a survey and tutorial on requirements, architectures, challenges, standards and solutions. IEEE Communications Surveys & Tutorials, Fourth Quarter 2011; 13(4):584-616.
-
(2011)
IEEE Communications Surveys & Tutorials, Fourth Quarter
, vol.13
, Issue.4
, pp. 584-616
-
-
Karagiannis, G.1
Altintas, O.2
Ekici, E.3
-
2
-
-
33745948310
-
-
The security of vehicular ad hoc networks. Proc. of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN) November
-
Raya M, Hubaux J-P. The security of vehicular ad hoc networks. Proc. of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN) November 2005; 11-21.
-
(2005)
, pp. 11-21
-
-
Raya, M.1
Hubaux, J.-P.2
-
4
-
-
33845564340
-
-
Securing vehicular communications. IEEE Wireless Communications Magazine, Special Issue on Inter-Vehicular Communications
-
Raya M, Papadimitratos P, Hubaux J-P. Securing vehicular communications. IEEE Wireless Communications Magazine, Special Issue on Inter-Vehicular Communications 2006; 13(5): 8-15.
-
(2006)
, vol.13
, Issue.5
, pp. 8-15
-
-
Raya, M.1
Papadimitratos, P.2
Hubaux, J.-P.3
-
5
-
-
84947273682
-
-
The Sybil attack. Proc. of International Workshop on Peer-to-Peer Systems
-
Douceur J. The Sybil attack. Proc. of International Workshop on Peer-to-Peer Systems 2002; 251-260.
-
(2002)
, pp. 251-260
-
-
Douceur, J.1
-
6
-
-
1342281463
-
The threat of intelligent collisions
-
Blum J, Eskandarian J. The threat of intelligent collisions. IT Professional 2004; 6(1):24-29.
-
(2004)
IT Professional
, vol.6
, Issue.1
, pp. 24-29
-
-
Blum, J.1
Eskandarian, J.2
-
7
-
-
44649172603
-
-
Using TPMs to secure vehicular ad-hoc networks (VANETs). Proc. of WISTP
-
Guette G, Bryce C. Using TPMs to secure vehicular ad-hoc networks (VANETs). Proc. of WISTP 2008; 106-116.
-
(2008)
, pp. 106-116
-
-
Guette, G.1
Bryce, C.2
-
8
-
-
50249136655
-
-
On the Sybil attack detection in VANET. Proc. of IEEE International Conference on Mobile Ad hoc and Sensor Systems (MASS) October
-
Guette G, Ducourthial B. On the Sybil attack detection in VANET. Proc. of IEEE International Conference on Mobile Ad hoc and Sensor Systems (MASS) October 2007; 1-6.
-
(2007)
, pp. 1-6
-
-
Guette, G.1
Ducourthial, B.2
-
9
-
-
58149526685
-
Defending mechanisms against Sybil attack in next generation mobile ad hoc networks
-
Pal S, Mukhopadhyay AK, Bhattacharya PP. Defending mechanisms against Sybil attack in next generation mobile ad hoc networks. IETE Technical Review 2008; 25(4):209-214.
-
(2008)
IETE Technical Review
, vol.25
, Issue.4
, pp. 209-214
-
-
Pal, S.1
Mukhopadhyay, A.K.2
Bhattacharya, P.P.3
-
10
-
-
34247328623
-
-
Detection and localization of Sybil nodes in VANETs. Proc. of Workshop on Dependability issues in Wireless Ad hoc Networks and Sensor Networks
-
Xiao B, Yu B, Gao B. Detection and localization of Sybil nodes in VANETs. Proc. of Workshop on Dependability issues in Wireless Ad hoc Networks and Sensor Networks 2006; 1-8.
-
(2006)
, pp. 1-8
-
-
Xiao, B.1
Yu, B.2
Gao, B.3
-
11
-
-
50249168206
-
-
Privacy-preserving detection of Sybil attacks in vehicular ad hoc networks. Proc. of International Conference on MobiQuitous
-
Zhou T, Choudhury RR, Ning P, Chakrabarty K. Privacy-preserving detection of Sybil attacks in vehicular ad hoc networks. Proc. of International Conference on MobiQuitous 2007; 1-8.
-
(2007)
, pp. 1-8
-
-
Zhou, T.1
Choudhury, R.R.2
Ning, P.3
Chakrabarty, K.4
-
13
-
-
77951463026
-
-
Defense against Sybil attack in vehicular ad-hoc network based on roadside units support. Proc. of IEEE Military Communications Conference (MILCOM) October
-
Park S, Aslam B, Turgut D, Zou C. Defense against Sybil attack in vehicular ad-hoc network based on roadside units support. Proc. of IEEE Military Communications Conference (MILCOM) October 2009; 1-7.
-
(2009)
, pp. 1-7
-
-
Park, S.1
Aslam, B.2
Turgut, D.3
Zou, C.4
-
14
-
-
77954337206
-
Secure traffic data propagation in vehicular ad hoc networks
-
Aslam B, Park S, Zou C, Turgut D. Secure traffic data propagation in vehicular ad hoc networks. International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC) 2010; 6(1):24-39.
-
(2010)
International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC)
, vol.6
, Issue.1
, pp. 24-39
-
-
Aslam, B.1
Park, S.2
Zou, C.3
Turgut, D.4
-
15
-
-
85124059044
-
Reliable traffic information propagation in vehicular Ad hoc networks
-
In, Beyah R, McNair J, Corbett C (eds). World Scientific Press, Singapore:
-
Park S, Zou C, Turgut D. Reliable traffic information propagation in vehicular Ad hoc networks. In Security in Ad-hoc and Sensor Networks, Beyah R, McNair J, Corbett C (eds). World Scientific Press, Singapore: 2009; 261-291.
-
(2009)
Security in Ad-hoc and Sensor Networks
, pp. 261-291
-
-
Park, S.1
Zou, C.2
Turgut, D.3
-
16
-
-
33845926634
-
-
An RSSI-based scheme for Sybil attack detection in wireless sensor networks. Proc. of International Symposium on World of Wireless, Mobile and Multimedia Networks
-
Demirbas M, Song Y. An RSSI-based scheme for Sybil attack detection in wireless sensor networks. Proc. of International Symposium on World of Wireless, Mobile and Multimedia Networks 2006; 564-570.
-
(2006)
, pp. 564-570
-
-
Demirbas, M.1
Song, Y.2
-
17
-
-
60349099898
-
-
Detecting the Sybil Attack cooperatively in wireless sensor networks. Proc. of International Conference on Computational Intelligence and Security (CIS)
-
Lv S, Wang X, Zhao X, Zhou X. Detecting the Sybil Attack cooperatively in wireless sensor networks. Proc. of International Conference on Computational Intelligence and Security (CIS) 2008; 442-446.
-
(2008)
, pp. 442-446
-
-
Lv, S.1
Wang, X.2
Zhao, X.3
Zhou, X.4
-
18
-
-
79960968694
-
-
p), Studies in Computational Intelligence, Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Springer
-
p), Studies in Computational Intelligence, Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Springer 2011; 368: 127-140.
-
(2011)
, vol.368
, pp. 127-140
-
-
Abdurahmonov, T.1
Yeoh, E.2
Hussain, H.M.3
-
19
-
-
37849048533
-
-
Efficient and robust pseudonymous authentication in VANET. Proc. of the Workshop on Vehicular Ad Hoc Networks (VANET) .
-
Calandriello G, Papadimitratos P, Lloy A, Hubaux J-P. Efficient and robust pseudonymous authentication in VANET. Proc. of the Workshop on Vehicular Ad Hoc Networks (VANET) 2007.
-
(2007)
-
-
Calandriello, G.1
Papadimitratos, P.2
Lloy, A.3
Hubaux, J.-P.4
-
21
-
-
84875654472
-
-
CARAVAN: providing location privacy for VANET. Proc. of Embedded Security in Cars (ESCAR) Nov. .
-
Sampigethaya K, Huang L, Li M, Poovendran R, Matsuura K, Sezaki K. CARAVAN: providing location privacy for VANET. Proc. of Embedded Security in Cars (ESCAR) Nov. 2005.
-
(2005)
-
-
Sampigethaya, K.1
Huang, L.2
Li, M.3
Poovendran, R.4
Matsuura, K.5
Sezaki, K.6
-
22
-
-
79951985228
-
-
A secure and efficient RSU-aided bundle forwarding protocol for vehicular delay tolerant networks. Special Issue on Network Security and Digital Forensics in Next Generation Communications of Wiley's Wireless Communications and Mobile Computing Journal February
-
Lin X, Chen H-H. A secure and efficient RSU-aided bundle forwarding protocol for vehicular delay tolerant networks. Special Issue on Network Security and Digital Forensics in Next Generation Communications of Wiley's Wireless Communications and Mobile Computing Journal February 2011; 11(2): 187-195.
-
(2011)
, vol.11
, Issue.2
, pp. 187-195
-
-
Lin, X.1
Chen, H.-H.2
-
23
-
-
70449565205
-
-
Tacking together efficient authentication, revocation and privacy in VANETs. Proc. of SECON June
-
Studer A, Shi E, Bai E, Perrig E. Tacking together efficient authentication, revocation and privacy in VANETs. Proc. of SECON June 2009; 1-9.
-
(2009)
, pp. 1-9
-
-
Studer, A.1
Shi, E.2
Bai, E.3
Perrig, E.4
-
24
-
-
84255195592
-
-
LPA: a new location-based privacy-preserving authentication protocol in VANET. Special Issue on Focus on Security and Privacy in Emerging Information Technologies of Wiley's Security and Communication Networks Journal January
-
Xue X, Ding J. LPA: a new location-based privacy-preserving authentication protocol in VANET. Special Issue on Focus on Security and Privacy in Emerging Information Technologies of Wiley's Security and Communication Networks Journal January 2012; 5(1): 69-78.
-
(2012)
, vol.5
, Issue.1
, pp. 69-78
-
-
Xue, X.1
Ding, J.2
-
25
-
-
3042785862
-
-
The Sybil attack in sensor networks: analysis & defenses. Proc. of International Symposium on Information Processing in Sensor Networks
-
Newsome J, Shi E, Song D, Perrig A. The Sybil attack in sensor networks: analysis & defenses. Proc. of International Symposium on Information Processing in Sensor Networks 2004; 259-268.
-
(2004)
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
26
-
-
50649106408
-
License plate recognition from still images and video sequences: a survey
-
Anagnostopoulos C-NE, Anagnostopoulos IE, Psoroulas ID, Loumos V, Kayafas E. License plate recognition from still images and video sequences: a survey. IEEE Trans. on Intelligent Transportation Systems 2008; 9(3):377-391.
-
(2008)
IEEE Trans. on Intelligent Transportation Systems
, vol.9
, Issue.3
, pp. 377-391
-
-
Anagnostopoulos, C.-N.1
Anagnostopoulos, I.E.2
Psoroulas, I.D.3
Loumos, V.4
Kayafas, E.5
-
27
-
-
84875645111
-
-
Introduction to Probability. Athena Scientific; 2nd edition
-
Bertsekas DP, Tsitsiklis JN. Introduction to Probability. Athena Scientific; 2nd edition, 2008.
-
(2008)
-
-
Bertsekas, D.P.1
Tsitsiklis, J.N.2
-
28
-
-
47249117927
-
-
An AAA study for service provisioning in vehicular networks. Proc. of IEEE LCN October
-
Coronado E, Cherkaoui S. An AAA study for service provisioning in vehicular networks. Proc. of IEEE LCN October 2007; 669-676.
-
(2007)
, pp. 669-676
-
-
Coronado, E.1
Cherkaoui, S.2
|