-
1
-
-
79953310708
-
Trajectory-based data forwarding for light-traffic vehicular ad hoc networks
-
May
-
J. Jeong, S. Guo, Y. Gu, T. He, and D. H. Du, "Trajectory-based data forwarding for light-traffic vehicular ad hoc networks, " IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 743-757, May 2011.
-
(2011)
IEEE Transactions on Parallel and Distributed Systems
, vol.22
, Issue.5
, pp. 743-757
-
-
Jeong, J.1
Guo, S.2
Gu, Y.3
He, T.4
Du, D.H.5
-
2
-
-
79959393009
-
-
US Federal Communication Commission, December. [Online]. Available
-
US Federal Communication Commission, "Dedicated. Short Range Communication Report and Order, " December 2003. [Online]. Available: http://fjallfoss.fcc.gov/edocs public/attachmatch/FCC-03-324A1.pdf/
-
(2003)
Dedicated. Short Range Communication Report and Order
-
-
-
3
-
-
50249170450
-
Wireless sensor network-based adaptive vehicle navigation in multihop-relay wimax networks
-
in, IEEE, March, Okinawa, Japan
-
B.-J. Chang, B.-J. Huang, and Y.-H. Liang, "Wireless sensor network-based adaptive vehicle navigation in multihop-relay wimax networks, " in Proc. of the 22nd International Conference on Advanced Information Networking and Applications (AINA'08), Okinawa, Japan. IEEE, March 2008, pp. 56-63.
-
(2008)
Proc. of the 22nd International Conference on Advanced Information Networking and Applications (AINA'08)
, pp. 56-63
-
-
Chang, B.-J.1
Huang, B.-J.2
Liang, Y.-H.3
-
4
-
-
70349655467
-
Spark: A new vanet-based smart parking scheme for large parking lots
-
in, IEEE, April, Rio de Janeiro, Brazil
-
R. Lu, X. Lin, H. Zhu, and X. Shen, "Spark: A new vanet-based smart parking scheme for large parking lots, " in Proc. of the 28th IEEE International Conference on Computer Communications (INFOCOM'09), Rio de Janeiro, Brazil. IEEE, April 2009, pp. 1413-1421.
-
(2009)
Proc. of the 28th IEEE International Conference on Computer Communications (INFOCOM'09)
, pp. 1413-1421
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Shen, X.4
-
5
-
-
84870542725
-
A real-time vehicle navigation algorithm in sensor network environments
-
December
-
C. L. P. Chen, J. Zhou, and W. Zhao, "A real-time vehicle navigation algorithm in sensor network environments, " IEEE Transactions on Intelligent Transportation Systems, vol. 13, no. 4, pp. 1657-1666, December 2012.
-
(2012)
IEEE Transactions on Intelligent Transportation Systems
, vol.13
, Issue.4
, pp. 1657-1666
-
-
Chen, C.L.P.1
Zhou, J.2
Zhao, W.3
-
6
-
-
36749076982
-
Gsis: A secure and privacy preserving protocol for vehicular communications
-
November
-
X. Lin, X. Sun, P.-H. Ho, and X. Shen, "Gsis: A secure and privacy preserving protocol for vehicular communications, " IEEE Transactions on Vehicular Technology, vol. 56, no. 6, pp. 3442-3456, November 2007.
-
(2007)
IEEE Transactions on Vehicular Technology
, vol.56
, Issue.6
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.-H.3
Shen, X.4
-
7
-
-
51349156734
-
Ecpp: Efficient conditional privacy preservation protocol for secure vehicular communications
-
in, IEEE, April, Phoenix, USA
-
R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, "Ecpp: Efficient conditional privacy preservation protocol for secure vehicular communications, " in Proc. of the 28th IEEE International Conference on Computer Communications (INFOCOM'08), Phoenix, USA. IEEE, April 2008, pp. 1229-1237.
-
(2008)
Proc. of the 28th IEEE International Conference on Computer Communications (INFOCOM'08)
, pp. 1229-1237
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Ho, P.-H.4
Shen, X.5
-
8
-
-
77953656768
-
An efficient anonymous authentication protocol for secure vehicular communications
-
May
-
Y. Park, C. Sur, C. D. Jung, and K.-H. Rhee, "An efficient anonymous authentication protocol for secure vehicular communications, " Journal of Information Science and Engineering, vol. 26, no. 3, pp. 785-800, May 2010.
-
(2010)
Journal of Information Science and Engineering
, vol.26
, Issue.3
, pp. 785-800
-
-
Park, Y.1
Sur, C.2
Jung, C.D.3
Rhee, K.-H.4
-
9
-
-
84866983141
-
Providing secure location-aware services for cooperative vehicular ad hoc networks
-
July
-
C. Sur, Y. Park, K. Sakurai, and K. H. Rhee, "Providing secure location-aware services for cooperative vehicular ad hoc networks, " Journal of Internet Technology, vol. 13, no. 4, pp. 631-644, July 2012.
-
(2012)
Journal of Internet Technology
, vol.13
, Issue.4
, pp. 631-644
-
-
Sur, C.1
Park, Y.2
Sakurai, K.3
Rhee, K.H.4
-
10
-
-
84886598854
-
Vspn: Vanet-based secure and privacy-preserving navigation
-
August
-
T. Chim, S. Yiu, L. C. Hui, and V. O. Li, "Vspn: Vanet-based secure and privacy-preserving navigation, " IEEE Transactions on Computers, vol. PP, no. 99, pp. 1-14, August 2012.
-
(2012)
IEEE Transactions on Computers
, vol.PP
, Issue.99
, pp. 1-14
-
-
Chim, T.1
Yiu, S.2
Hui, L.C.3
Li, V.O.4
-
11
-
-
84890899782
-
-
February. [Online]. Available
-
C. Tarnovsky, "Deconstructing a Secure Processor, " February 2010. [Online]. Available: https: //www.blackhat.com/html/bh-dc-10/bh-dc-10-archives.html
-
(2010)
Deconstructing a Secure Processor
-
-
Tarnovsky, C.1
-
12
-
-
70349557354
-
Hierarchical id-based cryptography
-
in, Springer-Verlag, December, Queenstown, New Zealand, LNCS
-
C. Gentry and A. Silverberg, "Hierarchical id-based cryptography, " in Proc. of the 8th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT'02), Queenstown, New Zealand, LNCS, vol. 2501. Springer-Verlag, December 2002, pp. 548-566.
-
(2002)
Proc. of the 8th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT'02)
, vol.2501
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
13
-
-
34347393777
-
Identity-based key agreement protocols from pairings
-
July
-
L. Chen, Z. Cheng, and N. P. Smart, "Identity-based key agreement protocols from pairings, " International Journal of Information Security, vol. 6, no. 4, pp. 213-241, July 2007.
-
(2007)
International Journal of Information Security
, vol.6
, Issue.4
, pp. 213-241
-
-
Chen, L.1
Cheng, Z.2
Smart, N.P.3
-
14
-
-
77950875046
-
The perfect time: An examination of time-synchronization techniques
-
in, Washington State University, October, Spokane, USA
-
K. Behrendt and K. Fodero, "The perfect time: An examination of time-synchronization techniques, " in Proc. of the 32rd Annual Western Protective Relay Conference, Spokane, USA. Washington State University, October 2005, pp. 1-18.
-
(2005)
Proc. of the 32rd Annual Western Protective Relay Conference
, pp. 1-18
-
-
Behrendt, K.1
Fodero, K.2
-
15
-
-
84873910697
-
Security and efficiency in roaming services for wireless networks: Challenges, approaches, and prospects
-
February
-
D. He, C. Chen, J. Bu, S. Chan, and Y. Zhang, "Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects, " IEEE Communications Magazine, vol. 51, no. 2, pp. 142-150, February 2013.
-
(2013)
IEEE Communications Magazine
, vol.51
, Issue.2
, pp. 142-150
-
-
He, D.1
Chen, C.2
Bu, J.3
Chan, S.4
Zhang, Y.5
-
16
-
-
0344875575
-
Information hiding, anonymity and privacy: A modular approach
-
January
-
D. Hughes and V. Shmatikov, "Information hiding, anonymity and privacy: a modular approach, " Journal of Computer Security, vol. 12, no. 1, pp. 3-36, January 2004.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.1
, pp. 3-36
-
-
Hughes, D.1
Shmatikov, V.2
-
17
-
-
78751651500
-
Sat: A security architecture achieving anonymity and traceability in wireless mesh networks
-
April
-
J. Sun, C. Zhang, Y. Zhang, and Y. Fang, "Sat: A security architecture achieving anonymity and traceability in wireless mesh networks, " IEEE Transactions on Dependable and Secure Computing, vol. 8, no. 2, pp. 295-307, April 2011.
-
(2011)
IEEE Transactions on Dependable and Secure Computing
, vol.8
, Issue.2
, pp. 295-307
-
-
Sun, J.1
Zhang, C.2
Zhang, Y.3
Fang, Y.4
-
18
-
-
74849096601
-
Privacy-preserving rental services using one-show anonymous credentials
-
December
-
Y. Yang, R. H. Deng, and F. Bao, "Privacy-preserving rental services using one-show anonymous credentials, " Security and Communication Networks, vol. 2, no. 6, pp. 531-545, December 2009.
-
(2009)
Security and Communication Networks
, vol.2
, Issue.6
, pp. 531-545
-
-
Yang, Y.1
Deng, R.H.2
Bao, F.3
-
19
-
-
84946840347
-
Short signatures from the weil pairing
-
in, Springer-Verlag, December, Gold Coast, Australia, LNCS
-
D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the weil pairing, " in Proc. of the 7th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT'01), Gold Coast, Australia, LNCS, vol. 2248. Springer-Verlag, December 2001, pp. 514-532.
-
(2001)
Proc. of the 7th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT'01)
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
20
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
February
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage, " ACM Transactions on Information and System Security, vol. 9, no. 1, pp. 1-30, February 2006.
-
(2006)
ACM Transactions on Information and System Security
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
|