-
3
-
-
84879977177
-
-
NHTSA (2008). Traffic safety fact sheet
-
NHTSA (2008). Traffic safety fact sheet.
-
-
-
-
4
-
-
84879948469
-
-
CARE (2007). Community road accident database
-
CARE (2007). Community road accident database.
-
-
-
-
5
-
-
84879962901
-
-
NHTSA (2006). Vehicle safety communications project - FINAL REPORT VSC. CAMP IVI Light Vehicle Enabling Research Program, DOT HS 810 591
-
NHTSA (2006). Vehicle safety communications project - FINAL REPORT VSC. CAMP IVI Light Vehicle Enabling Research Program, DOT HS 810 591.
-
-
-
-
6
-
-
85015402934
-
Use of elliptic curves in cryptography
-
LNCS 218
-
Miller, V. S. (1985). Use of elliptic curves in cryptography. In LNCS: Vol. 218. Advances in cryptology (CRYPTO) (pp. 417-426).
-
(1985)
Advances in Cryptology (CRYPTO)
, pp. 417-426
-
-
Miller, V.S.1
-
7
-
-
84879964586
-
-
National Institute of Standards and Technology (1999). Recommended Elliptic Curves for Federal Government Use. NIST
-
National Institute of Standards and Technology (1999). Recommended Elliptic Curves for Federal Government Use. NIST.
-
-
-
-
14
-
-
84968503742
-
Elliptic Curve Cryptosystems
-
10.1090/S0025-5718-1987-0866109-5
-
Koblitz, N. (1987). Elliptic Curve Cryptosystems. Mathematics of Computation, 48, 203-209.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
16
-
-
0142002511
-
The elliptic curve digital signature algorithm (ECDSA)
-
Johnson, D.; Menezes, A.; Vanstone, S. (2001). The elliptic curve digital signature algorithm (ECDSA). International Journal of Informatics Security, 1(1), 36-63.
-
(2001)
International Journal of Informatics Security
, vol.1
, Issue.1
, pp. 36-63
-
-
Johnson, D.1
Menezes, A.2
Vanstone, S.3
-
19
-
-
84944875437
-
Efficient elliptic curve cryptosystems from a scalar multiplication algorithm with recovery of the y-coordinate on a Montgomery-form elliptic curve
-
Okeya, K.; Sakura, K. (2001). Efficient elliptic curve cryptosystems from a scalar multiplication algorithm with recovery of the y-coordinate on a Montgomery-form elliptic curve. In 3th international workshop on cryptographic hardware and embedded systems (pp. 126-141).
-
(2001)
3th International Workshop on Cryptographic Hardware and Embedded Systems
, pp. 126-141
-
-
Okeya, K.1
Sakura, K.2
-
22
-
-
0027268812
-
High-radix modular multiplication for cryptosystems
-
Kornerup, P. (1993). High-radix modular multiplication for cryptosystems. In 11th symposium on computer arithmetic (pp. 277-283).
-
(1993)
11th Symposium on Computer Arithmetic
, pp. 277-283
-
-
Kornerup, P.1
-
24
-
-
62949187678
-
Fast implementation for modular inversion and scalar multiplication in the elliptic curve cryptography
-
2
-
Ma, S.; Hao, Y.; Pan, Z.; Chen, H. (2008). Fast implementation for modular inversion and scalar multiplication in the elliptic curve cryptography. In 2nd international symposium on intelligent information technology application (Vol. 2, pp. 488-492).
-
(2008)
2nd International Symposium on Intelligent Information Technology Application
, pp. 488-492
-
-
Ma, S.1
Hao, Y.2
Pan, Z.3
Chen, H.4
-
25
-
-
84947913604
-
Fast multiplication on elliptic curves over GF(2m) without precomputation
-
10.1007/3-540-48059-5-27
-
Lopez, J.; Dahab, R. (1999). Fast multiplication on elliptic curves over GF(2m) without precomputation. Cryptographic Hardware and Embedded Systems, 1717, 316-327.
-
(1999)
Cryptographic Hardware and Embedded Systems
, vol.1717
, pp. 316-327
-
-
Lopez, J.1
Dahab, R.2
-
26
-
-
84879934652
-
-
National Institute of Standards and Technology (2002). Fips 180-2, secure hash standard, federal information processing standard (fips). Publication 180-2
-
National Institute of Standards and Technology (2002). Fips 180-2, secure hash standard, federal information processing standard (fips). Publication 180-2.
-
-
-
-
30
-
-
84879954248
-
-
IEEE Vehicular Technology Society. 5.9 GHz dedicated short range communications (DSRC) - overview
-
IEEE Vehicular Technology Society. 5.9 GHz dedicated short range communications (DSRC) - overview.
-
-
-
-
33
-
-
14944367291
-
Empirical determination of channel characteristics for DSRC vehicle-to-vehicle communications
-
10.1145/1023875.1023890
-
Taliwal, V.; Jiang, D.; Mangold, H.; Chen, C.; Sengupta, R. (2004). Empirical determination of channel characteristics for DSRC vehicle-to-vehicle communications. In 1st ACM international workshop on vehicular ad hoc networks (VANET) (p. 88).
-
(2004)
1st ACM International Workshop on Vehicular Ad Hoc Networks (VANET)
, pp. 88
-
-
Taliwal, V.1
Jiang, D.2
Mangold, H.3
Chen, C.4
Sengupta, R.5
-
34
-
-
42149166675
-
Overhaul of IEEE 802.11 modeling and simulation in NS-2
-
10.1145/1298126.1298155
-
Chen, Q.; Schmidt-Eisenlohr, F.; Jiang, D.; Torrent-Moreno, M.; Delgrossi, L.; Hartenstein, H. (2007). Overhaul of IEEE 802.11 modeling and simulation in NS-2. In 10th ACM symposium on modeling, analysis, and simulation of wireless and mobile systems (MSWiM) (pp. 159-168).
-
(2007)
10th ACM Symposium on Modeling, Analysis, and Simulation of Wireless and Mobile Systems (MSWiM)
, pp. 159-168
-
-
Chen, Q.1
Schmidt-Eisenlohr, F.2
Jiang, D.3
Torrent-Moreno, M.4
Delgrossi, L.5
Hartenstein, H.6
-
35
-
-
51049112076
-
Proof-of-relevance: Filtering false data via authentic consensus in vehicle ad-hoc networks
-
Cao, Z.; Kong, J.; Lee, U.; Gerla, M.; Chen, Z. (2008). Proof-of-relevance: filtering false data via authentic consensus in vehicle ad-hoc networks. In IEEE conference on computer communications workshop (INFOCOM) (pp. 1-6).
-
(2008)
IEEE Conference on Computer Communications Workshop (INFOCOM)
, pp. 1-6
-
-
Cao, Z.1
Kong, J.2
Lee, U.3
Gerla, M.4
Chen, Z.5
-
37
-
-
37849048533
-
Efficient and robust pseudonymous authentication in VANET
-
10.1145/1287748.1287752
-
Calandriello, G.; et al. (2007). Efficient and robust pseudonymous authentication in VANET. In ACM VANET (pp. 19-28).
-
(2007)
ACM VANET
, pp. 19-28
-
-
Calandriello, G.1
-
38
-
-
34247355555
-
Cooperative collision warning using dedicated short range wireless communications
-
Elbatt, T.; Goel, S. K.; Holland, G.; Krishnan, H.; Parikh, J. (2006). Cooperative collision warning using dedicated short range wireless communications. In ACM VANET (pp. 1-9).
-
(2006)
ACM VANET
, pp. 1-9
-
-
Elbatt, T.1
Goel, S.K.2
Holland, G.3
Krishnan, H.4
Parikh, J.5
|