-
1
-
-
79959940449
-
Revocation in vanets: A survey
-
25-27 April
-
H. Al Falasi, and E. Barka, "Revocation in VANETs: A survey," Innovations in Information Technology (IIT), 2011 International Conference on, pp.214-219, 25-27 April 201.1
-
(2011)
Innovations in Information Technology (IIT), 2011 International Conference on
, pp. 214-219
-
-
Al Falasi, H.1
Barka, E.2
-
2
-
-
34247328623
-
Detection and localization of sybil nodes in vanets
-
Bin Xiao, Bo Yu, and Chuanshan Gao, "Detection and Localization of Sybil Nodes in VANETs", In ACM/SIGMOBILE Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks, pages 1-8, 2006.
-
(2006)
ACM/SIGMOBILE Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks
, pp. 1-8
-
-
Xiao, B.1
Yu, B.2
Gao, C.3
-
3
-
-
31744433511
-
Vehicle-to-vehicle wireless communication protocols for enhancing highway traffic safety
-
January
-
S. Biswas, R. Tatchikou, and F. Dion, "Vehicle-to-Vehicle Wireless Communication Protocols for Enhancing Highway Traffic Safety", IEEE Communications Magazine, vol.44, no 1, pp. 74-82, January 2006.
-
(2006)
IEEE Communications Magazine
, vol.44
, Issue.1
, pp. 74-82
-
-
Biswas, S.1
Tatchikou, R.2
Dion, F.3
-
4
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Springer-Verlag
-
D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," Proc. of Crypto2001, LNCS, pp. 213-229, Springer-Verlag, 2001.
-
(2001)
Proc. of Crypto2001, LNCS
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
5
-
-
84961361574
-
A robust detection of the sybil attack in urban vanets
-
Chen Chen, Xin Wang, Weili Han, and Binyu Zang, "A Robust Detection of the Sybil Attack in Urban VANETs", Distributed Computing Systems Workshops, ICDCS Workshops '09. 29th IEEE International Conference on, 2009, pp. 270-276, 2009.
-
(2009)
Distributed Computing Systems Workshops, ICDCS Workshops '09. 29th IEEE International Conference On, 2009
, pp. 270-276
-
-
Chen, C.1
Wang, X.2
Han, W.3
Zang, B.4
-
6
-
-
51249100419
-
RAise: an efficient rsu aided message authentication scheme in vehicular communication networks
-
Chenxi Zhang, Xiaodong Lin, Rongxing Lu, and Pin-Han Ho, "RAISE: An Efficient RSU Aided Message Authentication Scheme in Vehicular Communication Networks", Communications. ICC'08. IEEE International Conference on, pp. 1451-1457, 2008.
-
(2008)
Communications. ICC'08. IEEE International Conference on
, pp. 1451-1457
-
-
Zhang, C.1
Lin, X.2
Lu, R.3
Ho, P.4
-
8
-
-
80051977657
-
Secure clustering scheme based keys management in vanets
-
15-18 May
-
T. Gazdar, A. Benslimane and A. Belghith, "Secure Clustering Scheme Based Keys Management in VANETs," Vehicular Technology Conference (VTCSpring), 2011 IEEE 73rd, pp.1-5, 15-18 May 2011
-
(2011)
Vehicular Technology Conference (VTCSpring), 2011 IEEE 73rd
, pp. 1-5
-
-
Gazdar, T.1
Benslimane, A.2
Belghith, A.3
-
9
-
-
50249136655
-
On the sybil attack detection in vanet
-
Gilles Guette, Bertrand Ducourthial, "On the Sybil attack detection in VANET", IEEE International Conference on Mobile Ad hoc and Sensor Systems, 2007' mahss, pp.1-6, 2007
-
(2007)
IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2007' Mahss
, pp. 1-6
-
-
Guette, G.1
Ducourthial, B.2
-
10
-
-
84856332650
-
A dynamic key distribution protocol for pki-based vanets
-
10-12 Oct.
-
A. Hesham, A. Abdel-Hamid and M.A. El-Nasr, "A dynamic key distribution protocol for PKI-based VANETs," Wireless Days (WD), 2011 IFIP, pp.1-3, 10-12 Oct. 2011
-
(2011)
Wireless Days (WD), 2011 IFIP
, pp. 1-3
-
-
Hesham, A.1
Abdel-Hamid, A.2
El-Nasr, M.A.3
-
11
-
-
84860436171
-
A novel ID-based authentication framework with adaptive privacy preservation for VANETs
-
11-13 Jan.
-
Huang Lu, Jie Li and M. Guizani, "A novel ID-based authentication framework with adaptive privacy preservation for VANETs," Computing, Communications and Applications Conference (ComComAp), 2012, pp. 345-350, 11-13 Jan. 2012
-
(2012)
Computing, Communications and Applications Conference (ComComAp), 2012
, pp. 345-350
-
-
Lu, H.1
Li, J.2
Guizani, M.3
-
12
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
Y.C. Hu, A. Perrig and D.B Johnson, "Packet leashes: A defense against wormhole attacks in wireless networks", INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, vol. 3, pp. 1976-1986, 2003.
-
(2003)
INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies
, vol.3
, pp. 1976-1986
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
13
-
-
47749083946
-
IEEE 802.lip: Towards an International Standard for Wireless Access in Vehicular Environments
-
May
-
D. Jiang and L. Delgrossi, "IEEE 802.lip: Towards an International Standard for Wireless Access in Vehicular Environments", In Proceedings of IEEE Vehicular Technology Conference (VTC) spring, pp. 2036-2040, May 2008.
-
(2008)
Proceedings of IEEE Vehicular Technology Conference (VTC) Spring
, pp. 2036-2040
-
-
Jiang, D.1
Delgrossi, L.2
-
14
-
-
62349086825
-
A defense technique against misbehavior in VANETs based on threshold authentication
-
Jinyuan Sun, Yuguang Fang, "A defense technique against misbehavior in VANETs based on threshold authentication" Military Communications Conference MILCOM 2008. IEEE, pp. 1-7, 2008.
-
(2008)
Military Communications Conference MILCOM 2008. IEEE
, pp. 1-7
-
-
Sun, J.1
Fang, Y.2
-
15
-
-
84880315012
-
Vehicular network security
-
September
-
Md Mahbubul Haque, Jelena Misic, Vojislav Misic, Subir Biswas and Saeed Rashwand, "Vehicular Network Security" in Encyclopedia of Wireless and Mobile Communications, September, 2009.
-
(2009)
Encyclopedia of Wireless and Mobile Communications
-
-
Mahbubul Haque, M.1
Misic, J.2
Misic, V.3
Biswas, S.4
Rashwand, S.5
-
16
-
-
70449338849
-
Message authentication in vehicular ad hoc networks: ecdsa based approach
-
M. Manvi, M.S. Kakkasageri, and D.G. Adiga, "Message Authentication in Vehicular Ad Hoc Networks: ECDSA Based Approach", Future Computer and Communication, ICFCC 2009. International Conference on, 2009, pp. 16-20.
-
(2009)
Future Computer and Communication, ICFCC 2009. International Conference on
, pp. 16-20
-
-
Manvi, M.1
Kakkasageri, M.S.2
Adiga, D.G.3
-
18
-
-
33845564340
-
Securing vehicular communications
-
Maxim Raya, P. Papadimitratos and Jean-Pierre Hubaux, "Securing Vehicular Communications", IEEE Wireless Communications Magazine, Special Issue on Inter-Vehicular Communications, pp. 8-15, 2006.
-
(2006)
IEEE Wireless Communications Magazine, Special Issue on Inter-Vehicular Communications
, pp. 8-15
-
-
Raya, M.1
Papadimitratos, P.2
Hubaux, J.3
-
19
-
-
50249147682
-
Illusion attack on vanet applications - A message plausibility problem
-
Nai-Wei Lo, Hsiao-Chien Tsai, "Illusion Attack on VANET Applications-A Message Plausibility Problem",Globecom Workshops, 2007 IEEE, pp.1-8, 2007.
-
(2007)
Globecom Workshops, 2007 IEEE
, pp. 1-8
-
-
Lo, N.1
Tsai, H.2
-
20
-
-
3042785862
-
The sybil attack in sensor networks: analysis & defenses
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil Attack in Sensor Networks: Analysis & Defenses", In International symposium on information processing in sensor networks, pages 259-268, 2004.
-
(2004)
International Symposium on Information Processing in Sensor Networks
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
21
-
-
79961139179
-
An analytical model for random changing pseudonyms scheme in vanets
-
14-15 May
-
Yuanyuan Pan, Jianqing Li, Li Feng and Ben Xu, "An Analytical Model for Random Changing Pseudonyms Scheme in VANETs," Network Computing and Information Security (NCIS), 2011 International Conference on, vol.2, pp.141-145, 14-15 May 2011.
-
(2011)
Network Computing and Information Security (NCIS), 2011 International Conference on
, vol.2
, pp. 141-145
-
-
Pan, Y.1
Li, J.2
Feng, L.3
Xu, B.4
-
22
-
-
12444320349
-
Malicious node detection in wireless sensor networks
-
W. Pires, T. de Paula Figueiredo, HC. Wong, and A. Loureiro, "Malicious Node Detection in Wireless Sensor Networks", In IEEE International Parallel & Distributed Processing Symposium, 2004.
-
(2004)
IEEE International Parallel & Distributed Processing Symposium
-
-
Pires, W.1
Figueiredo Paula, T.D.2
Wong, H.C.3
Loureiro, A.4
-
23
-
-
71849097343
-
A novel approach for avoiding wormhole attacks in vanet
-
S.M. Safi, A. Movaghar and M. Mohammadizadeh, "A novel approach for avoiding wormhole attacks in VANET", Internet. AH-ICI 2009, First Asian Himalayas International Conference on, 2009, pp. 1-6
-
(2009)
Internet. AH-ICI 2009, First Asian Himalayas International Conference on
, pp. 1-6
-
-
Safi, S.M.1
Movaghar, A.2
Mohammadizadeh, M.3
-
24
-
-
84856202716
-
Behavior of attacker and some new possible attacks in Vehicular Ad hoc Network (VANET)
-
5-7 Oct.
-
I.A. Sumra, I. Ahmad, H. Hasbullah and J.-L. bin Ab Manan, "Behavior of attacker and some new possible attacks in Vehicular Ad hoc Network (VANET)," Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2011 3rd International Congress on, pp.1-8, 5-7 Oct. 2011
-
(2011)
Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2011 3rd International Congress on
, pp. 1-8
-
-
Sumra, I.A.1
Ahmad, I.2
Hasbullah, H.3
Bin Ab Manan, J.-L.4
-
25
-
-
77951463026
-
Defense against Sybil attack in vehicular ad hoc network based on roadside unit support
-
Soyoung Park, B. Aslam, D. Turgut and C.C. Zou, "Defense against Sybil attack in vehicular ad hoc network based on roadside unit support", Military Communications Conference, MILCOM,IEEE, 2009, pp. 1-7
-
(2009)
Military Communications Conference, MILCOM,IEEE
, pp. 1-7
-
-
Park, S.1
Aslam, B.2
Turgut, D.3
Zou, C.C.4
-
26
-
-
71049143933
-
Security and privacy issues for inter-vehicle communications in VANETs
-
Tat Wing Chim, S.M. Yiu, L.C.K. Hui and V.O.K Li, "Security and Privacy Issues for Inter-vehicle Communications in VANETs", Sensor, Mesh and Ad Hoc Communications and Networks Workshops, 2009. SECON Workshops '09. 6th Annual IEEE Communications Society Conference on, 2009, pp. 1-3.
-
(2009)
Sensor, Mesh and Ad Hoc Communications and Networks Workshops, 2009. SECon Workshops '09. 6th Annual IEEE Communications Society Conference on
, pp. 1-3
-
-
Wing Chim, T.1
Yiu, S.M.2
Hui, L.C.K.3
Li, V.O.K.4
-
28
-
-
51449098979
-
An efficient identity based batch verification scheme for vehicular sensor networks
-
Apr.
-
C. Zhang, R. Lu, X. Lin, P.H. Ho and X.. Shen, "An Efficient Identity based Batch Verification Scheme for Vehicular Sensor Networks," in IEEE Proceedings of the INFOCOM '08, Apr. 2008, pp. 816-824.
-
(2008)
IEEE Proceedings of the INFOCOM '08
, pp. 816-824
-
-
Zhang, C.1
Lu, R.2
Lin, X.3
Ho, P.H.4
Shen, X.5
|