-
1
-
-
33747406625
-
Vehicle safety communications project: Task 3 final report: identify intelligent vehicle safety applications enabled by DSRC
-
CAMP., Vehicle Safety Communications Consortium. National Highway Traffic Safety Administration U.S. Department of Transportation, Washington DC
-
CAMP Vehicle Safety Communications Consortium, "Vehicle safety communications project: Task 3 final report: identify intelligent vehicle safety applications enabled by DSRC," National Highway Traffic Safety Administration, U.S. Department of Transportation, Washington DC 2005.
-
(2005)
-
-
-
2
-
-
3042594839
-
The security and privacy of smart vehicles
-
May-June 2004
-
J. P. Hubaux, S. Capkun, and Jun Luo, "The security and privacy of smart vehicles", IEEE Security and Privacy Magazine, vol. 02, issue 3, pp. 49-55, May-June 2004.
-
IEEE Security and Privacy Magazine
, vol.2
, Issue.3
, pp. 49-55
-
-
Hubaux, J.P.1
Capkun, S.2
Luo, J.3
-
3
-
-
15344351248
-
Service differentiation in multi-hop inter-vehicular communication using directional antenna
-
May 17-19, 2004, Milan, Italy
-
S. Roy, D. Saha, S. Bandyopadhyay, T. Ueda and S. Tanaka, "Service differentiation in multi-hop inter-vehicular communication using directional antenna," in Proc. IEEE Semiannual Vehicular Technology Conference, May 17-19, 2004, Milan, Italy, pp. 2176-2180.
-
Proc. IEEE Semiannual Vehicular Technology Conference
, pp. 2176-2180
-
-
Roy, S.1
Saha, D.2
Bandyopadhyay, S.3
Ueda, T.4
Tanaka, S.5
-
4
-
-
10644253733
-
Challenges of intervehicle ad hoc networks
-
Dec. 2004
-
J. Blum, A. Eskandarian and L. Hoffman, "Challenges of intervehicle ad hoc networks," IEEE Transportation Systems, vol. 5, pp.347 - 351, Dec. 2004.
-
IEEE Transportation Systems
, vol.5
, pp. 347-351
-
-
Blum, J.1
Eskandarian, A.2
Hoffman, L.3
-
5
-
-
84884117331
-
The security of vehicular ad hoc networks
-
IC/2005/009, March 2005
-
M. Raya and J. Hubaus, "The security of vehicular ad hoc networks", EPFL Tech. Rep. IC/2005/009, March 2005.
-
EPFL Tech. Rep.
-
-
Raya, M.1
Hubaus, J.2
-
6
-
-
77953500318
-
Vehicular grid communications: the role of the internet infrastructure
-
Boston, NY, August 2006. (Invited Paper)
-
Mario Gerla, Biao Zhou, Yeng-Zhong Lee, Fabio Soldo, Uichin Lee, and Gustavo Marfia, "Vehicular grid communications: the role of the internet infrastructure", in Proc. 2nd Annual International Workshop on Wireless Internet (WICON 2006), Boston, NY, August 2006. (Invited Paper)
-
Proc. 2nd Annual International Workshop on Wireless Internet (WICON 2006)
-
-
Gerla, M.1
Zhou, B.2
Lee, Y.-Z.3
Soldo, F.4
Lee, U.5
Marfia, G.6
-
7
-
-
33845781153
-
Security issues in a future vehicular network
-
Florence, Italy, Feb
-
M. Zarki, S. Mehrotra, G. Tsudik and N. Venkatasubramanian, "Security issues in a future vehicular network," In Proc. European Wireless 2002 Conference, Florence, Italy, Feb. 2002.
-
(2002)
Proc. European Wireless 2002 Conference
-
-
Zarki, M.1
Mehrotra, S.2
Tsudik, G.3
Venkatasubramanian, N.4
-
8
-
-
39049116456
-
A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks
-
Y. L. Sun, Z. Han, W. Yu, and K. J. R. Liu, "A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks", In Proc. IEEE INFOCOM 2006, pp. 1-13.
-
Proc. IEEE INFOCOM 2006
, pp. 1-13
-
-
Sun, Y.L.1
Han, Z.2
Yu, W.3
Liu, K.J.R.4
-
9
-
-
33846602719
-
Trust modeling and evaluation in ad hoc networks
-
28 Nov.-2 Dec
-
Yan Sun, Wei Yu, Zhu Han, and K.J.R. Liu, "Trust modeling and evaluation in ad hoc networks", In Proc. IEEE GLOBECOM '05, vol. 3, 28 Nov.-2 Dec. 2005.
-
(2005)
Proc. IEEE GLOBECOM '05
, vol.3
-
-
Sun, Y.1
Yu, W.2
Han, Z.3
Liu, K.J.R.4
-
10
-
-
17144420084
-
Computing of trust in wireless networks
-
26-29 Sept
-
Huafei Zhu, Feng Bao, and R.H. Deng, "Computing of trust in wireless networks", In Proc. IEEE 60th Vehicular Technology Conference, 26-29 Sept. 2004, vol. 4, pp. 2621 - 2624.
-
(2004)
Proc. IEEE 60th Vehicular Technology Conference
, vol.4
, pp. 2621-2624
-
-
Zhu, H.1
Bao, F.2
Deng, R.H.3
-
11
-
-
33745940320
-
A quantitative trust establishment framework for reliable data packet delivery in MANETs
-
Alexandria, VA, USA, November 7
-
C. Zouridaki, B. L. Mark, M. Hejmo, and R. K. Thomas, "A quantitative trust establishment framework for reliable data packet delivery in MANETs," In Proc. 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005), Alexandria, VA, USA, November 7, 2005.
-
(2005)
Proc. 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005)
-
-
Zouridaki, C.1
Mark, B.L.2
Hejmo, M.3
Thomas, R.K.4
-
12
-
-
51149115032
-
A data intensive reputation management scheme for vehicular ad hoc networks
-
July 2006
-
Anand Patwardhan, Anupam Joshi, Tim Finin, and Yelena Yesha, "A data intensive reputation management scheme for vehicular ad hoc networks", In Proc. 3rd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, July 2006, pp. 1-8.
-
Proc. 3rd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
, pp. 1-8
-
-
Patwardhan, A.1
Joshi, A.2
Finin, T.3
Yesha, Y.4
-
14
-
-
14344258545
-
Incentive-based modeling and inference of attacker intent, objectives, and strategies
-
Washington D.C., USA, October
-
Peng Liu, and Wanyu Zang, "Incentive-based modeling and inference of attacker intent, objectives, and strategies," In Proc. 10th ACM Conference on Computer and Communications Security (CCS '03), Washington D.C., USA, October 2003, pp. 179 - 189.
-
(2003)
Proc. 10th ACM Conference on Computer and Communications Security (CCS '03)
, pp. 179-189
-
-
Liu, P.1
Zang, W.2
-
15
-
-
70349483384
-
SEVECOM - secure vehicle communication
-
June
-
T. Leinmüller, L. Buttyan, J.-P. Hubaux, F. Kargl, R. Kroh, P. Papadimitratos, M. Raya, and E. Schoch, "SEVECOM - secure vehicle communication," in Proc. IST Mobile and Wireless Communication Summit, June 2006.
-
(2006)
Proc. IST Mobile and Wireless Communication Summit
-
-
Leinmüller, T.1
Buttyan, L.2
Hubaux, J.-P.3
Kargl, F.4
Kroh, R.5
Papadimitratos, P.6
Raya, M.7
Schoch, E.8
-
19
-
-
0040421624
-
Design and implementation of digital radio communications link for platoon control experiments
-
University of California, Berkeley, Jan
-
W. Li, "Design and implementation of digital radio communications link for platoon control experiments," PATH Research Report UCB-ITS-PRR-95-2, University of California, Berkeley, Jan. 1995.
-
(1995)
PATH Research Report UCB-ITS-PRR-95-2
-
-
Li, W.1
-
20
-
-
0041015706
-
Automatic following system utilizing vehicle-to-vehicle communication
-
Oct. 1998
-
M. Ohomo, R. Kimura, S. Fukushima and N. Fujii, "Automatic following system utilizing vehicle-to-vehicle communication," In Proc. IEEE International Conference on Intelligent Vehicle, Oct. 1998, pp. 381-384.
-
Proc. IEEE International Conference on Intelligent Vehicle
, pp. 381-384
-
-
Ohomo, M.1
Kimura, R.2
Fukushima, S.3
Fujii, N.4
-
21
-
-
84892915170
-
A communication system for the control of automated vehicle
-
University of California, Berkeley, Sept. 1993
-
S. Sachs and P. Varaiya, "A communication system for the control of automated vehicle," PATH Tech. Memorandum 93-5, University of California, Berkeley, Sept. 1993.
-
PATH Tech. Memorandum 93-5
-
-
Sachs, S.1
Varaiya, P.2
-
22
-
-
0030263657
-
Inter-vehicle communication: Technical issues on vehicle control application
-
Oct. 1996
-
M. Aoki and H. Fujii, "Inter-vehicle communication: Technical issues on vehicle control application," IEEE Communications Magazine, vol. 34, no. 10, pp. 90-93, Oct. 1996.
-
IEEE Communications Magazine
, vol.34
, Issue.10
, pp. 90-93
-
-
Aoki, M.1
Fujii, H.2
-
23
-
-
85027141339
-
Vehicle density and communication load estimation in mobile radio local area networks (MR-LANs)
-
May 1992
-
W. Kremer and W. Kremer, "Vehicle density and communication load estimation in mobile radio local area networks (MR-LANs)", In Proc. 42nd Vehicular Technology Society Conference, May 1992, vol. 2, pp. 698-704.
-
Proc. 42nd Vehicular Technology Society Conference
, vol.2
, pp. 698-704
-
-
Kremer, W.1
Kremer, W.2
-
24
-
-
13244285518
-
Group Membership and Communication in Highly Mobile Ad Hoc Networks
-
PhD Thesis, School of Electrical Engineering and Computer Science, Technical University of Berlin, Germany
-
L. Briesemeister, "Group Membership and Communication in Highly Mobile Ad Hoc Networks," PhD Thesis, School of Electrical Engineering and Computer Science, Technical University of Berlin, Germany, 2001
-
(2001)
-
-
Briesemeister, L.1
-
25
-
-
34247336902
-
Efficient secure aggregation in VANETs
-
September 2006, Los Angeles, CA, USA
-
Maxim Raya, Adel Aziz, and Jean-Pierre Hubaux, "Efficient secure aggregation in VANETs", In Proc. 3rd International Workshop on Vehicular Ad Hoc Networks (VANET '06), September 2006, Los Angeles, CA, USA, pp. 67 - 75.
-
Proc. 3rd International Workshop on Vehicular Ad Hoc Networks (VANET '06)
, pp. 67-75
-
-
Raya, M.1
Aziz, A.2
Hubaux, J.-P.3
-
27
-
-
33750938846
-
Towards a security architecture for vehicular ad hoc networks
-
20-22 April 2006
-
K. Plossl, T. Nowey and C. Mletzko, "Towards a security architecture for vehicular ad hoc networks", In Proc. 1st International Conference on Availability, Reliability and Security, 20-22 April 2006, pp. 374 - 381.
-
Proc. 1st International Conference on Availability, Reliability and Security
, pp. 374-381
-
-
Plossl, K.1
Nowey, T.2
Mletzko, C.3
-
29
-
-
35248874429
-
Multipurpose Identity-based Signcryption: A Swiss Army Knife for Identity-based Cryptography
-
LNCS 2729, Springer-Verlag, Berlin
-
X. Boyan, "Multipurpose Identity-based Signcryption: A Swiss Army Knife for Identity-based Cryptography," In Proc. Of CRYPTO 2003, LNCS 2729, Springer-Verlag, Berlin. pp. 383-399.
-
Proc. Of CRYPTO 2003
, pp. 383-399
-
-
Boyan, X.1
-
30
-
-
0242445175
-
Identity-based Signcryption
-
Report 2002/098, 2002
-
J. Malone-Lee, "Identity-based Signcryption," Cryptology ePrint Archive, Report 2002/098, 2002, [Online]: http://eprint.iacr.org/2002/098.
-
Cryptology ePrint Archive
-
-
Malone-Lee, J.1
-
31
-
-
24144434019
-
Fast and proven secure blind identity-based signcrption from pairings
-
Springer-Verlag, 2005, LNCS 3376
-
T. H. Yuen and V. K. Wei, "Fast and proven secure blind identity-based signcrption from pairings, " in Proc. Of CT-RSA 2005, Springer-Verlag, 2005, LNCS 3376, pp 305-322.
-
Proc. Of CT-RSA 2005
, pp. 305-322
-
-
Yuen, T.H.1
Wei, V.K.2
-
32
-
-
1342281463
-
The threat of intelligent collision
-
Jan.-Feb
-
J. Blum and A. Eskabdaruab, "The threat of intelligent collision," IT Professional, vol. 6, Jan.-Feb. 2004, pp. 24-29.
-
(2004)
IT Professional
, vol.6
, pp. 24-29
-
-
Blum, J.1
Eskabdaruab, A.2
-
35
-
-
14944372809
-
Detecting and correcting malicious data in VANETs
-
P. Golle, D. Greene, and J. Staddon, "Detecting and correcting malicious data in VANETs," in Proc. 1st ACM Workshop on Vehicular Ad hoc Networks (VANET '04), 2004, pp. 29-37.
-
(2004)
Proc. 1st ACM Workshop on Vehicular Ad hoc Networks (VANET '04)
, pp. 29-37
-
-
Golle, P.1
Greene, D.2
Staddon, J.3
-
36
-
-
84946833891
-
How to leak a secret
-
LNCS 2248
-
R. L. Rivest, A. Shamir, and Y. Tauman, "How to leak a secret," In Proc. 7th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2001), LNCS 2248, pp. 552-565.
-
Proc. 7th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2001)
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
37
-
-
2942524994
-
Location privacy in pervasive computing
-
Jan. 2003
-
R. Beresford and F. Stajano, "Location privacy in pervasive computing," IEEE Pervasive Computing, vol. 2, Jan. 2003, pp. 46-55.
-
IEEE Pervasive Computing
, vol.2
, pp. 46-55
-
-
Beresford, R.1
Stajano, F.2
-
38
-
-
46749112734
-
Vehicular Ad Hoc Networks: A New Challenge for Localization-Based Systems
-
July 2008
-
Boukerch et al., "Vehicular Ad Hoc Networks: A New Challenge for Localization-Based Systems," Computer Communication (2008), vol. 31, July 2008, pp. 2838 - 2849.
-
(2008)
Computer Communication
, vol.31
, pp. 2838-2849
-
-
Boukerch1
-
39
-
-
24944489750
-
Enhancing wireless location privacy using silent period
-
Mar. 2005
-
L. Huang, K. Matsuura, H. Yamane and K. Sezaki, "Enhancing wireless location privacy using silent period," in Proc. IEEE Wireless Communications and Networking Conference, Mar. 2005, vol. 2, pp. 1187-1192.
-
Proc. IEEE Wireless Communications and Networking Conference
, vol.2
, pp. 1187-1192
-
-
Huang, L.1
Matsuura, K.2
Yamane, H.3
Sezaki, K.4
-
40
-
-
84885223558
-
Swing and swap: user-centric approaches towards maximizing location privacy
-
Oct. 2006, Alexandria, Virginia, USA
-
Mingyan Li, Krishna Sampigethaya, Leping Huang, Radha Poovendran, "Swing and swap: user-centric approaches towards maximizing location privacy," In Proc. 5th ACM Workshop on Privacy in Electronic Society (WPES '06), Oct. 2006, Alexandria, Virginia, USA, pp. 19 - 28..
-
Proc. 5th ACM Workshop on Privacy in Electronic Society (WPES '06)
, pp. 19-28
-
-
Li, M.1
Sampigethaya, K.2
Huang, L.3
Poovendran, R.4
-
41
-
-
34547365680
-
Privacy in VANETs using Changing Pseudonyms - Ideal and Real
-
22-25 April 2007
-
M. Gerlach and F. Guttler, "Privacy in VANETs using Changing Pseudonyms - Ideal and Real," In Proc. IEEE 65th Vehicular Technology Conference, 22-25 April 2007, pp. 2521 - 2525.
-
Proc. IEEE 65th Vehicular Technology Conference
, pp. 2521-2525
-
-
Gerlach, M.1
Guttler, F.2
-
42
-
-
57049149967
-
CARAVAN: providing location privacy for VANET
-
Nov. 2005, Cologne, Germany
-
R. Sampigethaya, Leping Huang, Mingyan Li, Radha Poovendran, K. Matsuura and K. Sezaki, "CARAVAN: providing location privacy for VANET," in Proc. 3rd workshop on Embedded Security in Cars (ESCAR), Nov. 2005, Cologne, Germany.
-
Proc. 3rd workshop on Embedded Security in Cars (ESCAR)
-
-
Sampigethaya, R.1
Huang, L.2
Li, M.3
Poovendran, R.4
Matsuura, K.5
Sezaki, K.6
-
43
-
-
35349016950
-
AMOEBA: robust location privacy scheme for VANET
-
Oct. 2007
-
K. Sampigethaya, M. Li, L. Huang and R. Poovendran, "AMOEBA: robust location privacy scheme for VANET", IEEE JSAC, vol.25, pp. 1569 - 1589, Oct. 2007.
-
IEEE JSAC
, vol.25
, pp. 1569-1589
-
-
Sampigethaya, K.1
Li, M.2
Huang, L.3
Poovendran, R.4
-
44
-
-
36749076982
-
GSIS: a secure and privacy-preserving protocol for vehicular communications
-
Nov. 2007
-
Xiaodong Lin, Xiaoting Sun, Pin-Han Ho and Xuemin Shen, "GSIS: a secure and privacy-preserving protocol for vehicular communications", IEEE Tran. on Vehicular Technology, vol. 56, pp. 3422 - 3456, Nov. 2007.
-
IEEE Tran. on Vehicular Technology
, vol.56
, pp. 3422-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.-H.3
Shen, X.4
-
45
-
-
51349103067
-
Adaptive privacy-preserving authentication in vehicular networks
-
Oct. 2006
-
K. Sha, Y. Xi, W. Shi, L. Schwiebert and T. Zhang, "Adaptive privacy-preserving authentication in vehicular networks," In Proc. International Workshop on Vehicle Communication and Applications, Oct. 2006.
-
Proc. International Workshop on Vehicle Communication and Applications
-
-
Sha, K.1
Xi, Y.2
Shi, W.3
Schwiebert, L.4
Zhang, T.5
-
46
-
-
34547533155
-
Enforcing privacy using symmetric random key-set in vehicular networks
-
21-23 Mar. 2007
-
Yong Xi, Kewei Sha, Weisong Shi, Loren Schwiebert and Tao Zhang, "Enforcing privacy using symmetric random key-set in vehicular networks", In Proc. 8th International Symposium on Autonomous Decentralized Systems, 21-23 Mar. 2007, pp. 344 - 351.
-
Proc. 8th International Symposium on Autonomous Decentralized Systems
, pp. 344-351
-
-
Xi, Y.1
Sha, K.2
Shi, W.3
Schwiebert, L.4
Zhang, T.5
-
48
-
-
34247328623
-
Detection and localization of sybil nodes in VANETs
-
Sep. 2006
-
Bin Xiao, Bo Yu and Chuanshan Gao, "Detection and localization of sybil nodes in VANETs,", In Proc. Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks, Sep. 2006, pp. 1-8.
-
Proc. Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks
, pp. 1-8
-
-
Xiao, B.1
Yu, B.2
Gao, C.3
-
52
-
-
37849048533
-
Efficient and robust pseudonymous authentication in VANET
-
Sep. 2007
-
Giorgio Calandriello, Panos Papadimitratos, Jean-Pierre Hubaux and Antonio Lioy, "Efficient and robust pseudonymous authentication in VANET," In Proc. 4th ACM International Workshop on Vehicular Ad Hoc Networks (VANET '07), Sep. 2007, pp. 19 - 28.
-
Proc. 4th ACM International Workshop on Vehicular Ad Hoc Networks (VANET '07)
, pp. 19-28
-
-
Calandriello, G.1
Papadimitratos, P.2
Hubaux, J.-P.3
Lioy, A.4
-
53
-
-
48649088209
-
A group signature based secure and privacypreserving vehicular communication framework
-
May 2007
-
J. Guo, J.P. Baugh and S. Wang, "A group signature based secure and privacypreserving vehicular communication framework," In Proc. of MOVE workshop in IEEE INFOCOM' 07, May 2007, pp. 103 - 108.
-
Proc. of MOVE workshop in IEEE INFOCOM' 07
, pp. 103-108
-
-
Guo, J.1
Baugh, J.P.2
Wang, S.3
-
55
-
-
36349002968
-
Support of anonymity in VANETs - putting pseudonymity into practice
-
Mar. 2007
-
E. Fonseca, A. Festag, R. Baldessari and R.L. Aguiar, "Support of anonymity in VANETs - putting pseudonymity into practice," In Proc. IEEE Wireless Communications and Networking Conference, Mar. 2007, pp. 3400 - 3405.
-
Proc. IEEE Wireless Communications and Networking Conference
, pp. 3400-3405
-
-
Fonseca, E.1
Festag, A.2
Baldessari, R.3
Aguiar, R.L.4
-
56
-
-
47849101841
-
Strategies for pseudonym changes in vehicular ad hoc networks depending on node mobility
-
June 2007
-
Stephan Eichler, "Strategies for pseudonym changes in vehicular ad hoc networks depending on node mobility," In Proc. IEEE Intelligent Vehicles Symposium, June 2007, pp. 541 - 546.
-
Proc. IEEE Intelligent Vehicles Symposium
, pp. 541-546
-
-
Eichler, S.1
-
57
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. Giuli, K. Lai and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. 6th Annual International Conference on Mobile Computing and Networking, 2000, pp. 255 - 265.
-
(2000)
Proc. 6th Annual International Conference on Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
58
-
-
4544308674
-
Observation-based Cooperation Enforcement in Ad Hoc Networks
-
Stanford University, July 2003
-
S. Bansal and M. Baker, "Observation-based Cooperation Enforcement in Ad Hoc Networks," Tech. Rep., Stanford University, July 2003.
-
Tech. Rep.
-
-
Bansal, S.1
Baker, M.2
-
59
-
-
0004118144
-
Nuglets: A virtual currency to stimulate cooperation in self-organized mobile ad hoc networks
-
DSC/2001/001, Department of Communication Systems, Swiss Federal Institute of Technology
-
L.Buttyan and J. P. Hubaux, "Nuglets: A virtual currency to stimulate cooperation in self-organized mobile ad hoc networks," Tech. Rep. DSC/2001/001, Department of Communication Systems, Swiss Federal Institute of Technology, 2001.
-
(2001)
Tech. Rep.
-
-
Buttyan, L.1
Hubaux, J.P.2
-
61
-
-
0042933944
-
Sprite: a simple cheat-proof credit-based system for mobile ad-hoc networks
-
March-April 2003
-
S.Zhong, J. Chen and Y. R. Yang, "Sprite: a simple cheat-proof credit-based system for mobile ad-hoc networks," In proc. 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), March-April 2003, vol. 3, pp. 1987-1997.
-
proc. 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003)
, vol.3
, pp. 1987-1997
-
-
Zhong, S.1
Chen, J.2
Yang, Y.R.3
-
64
-
-
85113133621
-
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
Sept. 2002
-
P. Michiardi and R. Molva, "Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," In Proc. IFIP-Communication and Multimedia Security Conference, Sept. 2002, pp. 107 - 121.
-
Proc. IFIP-Communication and Multimedia Security Conference
, pp. 107-121
-
-
Michiardi, P.1
Molva, R.2
-
66
-
-
34548186215
-
The buddy system: a distributed reputation system based on social structure
-
Universität Karlsruhe, Faculty of Informatics. March 2004
-
S. Tahnrich and P.Oreiter, "The buddy system: a distributed reputation system based on social structure," Tech. Rep. 2004-1, Universität Karlsruhe, Faculty of Informatics. March 2004.
-
Tech. Rep. 2004-1
-
-
Tahnrich, S.1
Oreiter, P.2
-
67
-
-
84892918935
-
A generic packet-dropping detection mechanism augmented with efficient power saving in ad hoc networks
-
Mar. 2006
-
V. Oberoi and C. Chigan, "A generic packet-dropping detection mechanism augmented with efficient power saving in ad hoc networks," In Proc. SPIE Symposium on Defense and Security, Mar. 2006, pp.1-10.
-
Proc. SPIE Symposium on Defense and Security
, pp. 1-10
-
-
Oberoi, V.1
Chigan, C.2
-
69
-
-
24944447171
-
Resource-aware self-adaptive security provisioning in mobile ad hoc networks
-
Mar. 2005
-
Chunxiao Chigan, Leiyuan Li and Yinghua Ye, "Resource-aware self-adaptive security provisioning in mobile ad hoc networks," In Proc. IEEE Wireless Communications and Networking Conference, Mar. 2005, vol. 4, pp. 2118 - 2124.
-
Proc. IEEE Wireless Communications and Networking Conference
, vol.4
, pp. 2118-2124
-
-
Chigan, C.1
Li, L.2
Ye, Y.3
-
70
-
-
33144465932
-
Information theoretic framework of trust modeling and evaluation for ad hoc networks
-
Feb. 2006
-
Yan Lindsay Sun, Wei Yu, Zhu Han and K.J.R. Liu, "Information theoretic framework of trust modeling and evaluation for ad hoc networks," IEEE JSAC vol. 24, Feb. 2006, pp. 305 - 317.
-
IEEE JSAC
, vol.24
, pp. 305-317
-
-
Sun, Y.L.1
Yu, W.2
Han, Z.3
Liu, K.J.R.4
-
71
-
-
44049108171
-
Attacks on trust evaluation in distributed networks
-
Mar. 2006
-
Y. L. Sun, Z. Han, W. Yu and K.J.R. Liu, "Attacks on trust evaluation in distributed networks," In Proc. 40th Annual Conference on Information Sciences and Systems, Mar. 2006, pp. 1461 - 1466.
-
Proc. 40th Annual Conference on Information Sciences and Systems
, pp. 1461-1466
-
-
Sun, Y.L.1
Han, Z.2
Yu, W.3
Liu, K.J.R.4
-
72
-
-
34250782069
-
A bayesian network based trust model for improving collaboration in mobile ad hoc networks
-
Mar. 2007
-
Chung Tien Nguyen, Olivier Camp and Stephane Loiseau, "A bayesian network based trust model for improving collaboration in mobile ad hoc networks," In Proc. IEEE International Conference on Research, Innovation and Vision for the Future, Mar. 2007, pp. 144 - 151.
-
Proc. IEEE International Conference on Research, Innovation and Vision for the Future
, pp. 144-151
-
-
Nguyen, C.T.1
Camp, O.2
Loiseau, S.3
-
73
-
-
34547277464
-
An objective trust management framework for mobile ad hoc networks
-
22-25 Apr. 2007
-
Ruidong Li, Jie Li, Peng Liu and Hsiao-Hwa Chen, "An objective trust management framework for mobile ad hoc networks," In Proc. 65th IEEE Vehicular Technology Conference, 22-25 Apr. 2007, pp. 56 - 60.
-
Proc. 65th IEEE Vehicular Technology Conference
, pp. 56-60
-
-
Li, R.1
Li, J.2
Liu, P.3
Chen, H.-H.4
-
75
-
-
17144421339
-
Pretty Good Privacy (PGP)
-
MIT, October
-
Phil Zimmermann. Pretty Good Privacy (PGP), PGP User's Guide, MIT, October, 1994.
-
(1994)
PGP User's Guide
-
-
Zimmermann, P.1
-
76
-
-
84982899264
-
The role of trust management in distributed systems security
-
(Vitek and Jensen, eds.) Springer-Verlag
-
M. Blaze, J. Feigenbaum and J. Ioannidis, "The role of trust management in distributed systems security," Chapter in Secure Internet Programming: Security Issues for Mobile and Distributed Objects, (Vitek and Jensen, eds.) Springer-Verlag, 1999.
-
(1999)
Secure Internet Programming: Security Issues for Mobile and Distributed Objects
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
-
77
-
-
33144465377
-
On trust models and trust evaluation metrics for ad hoc networks
-
Feb. 2006
-
G. Theodorakopoulos and J.S. Baras, "On trust models and trust evaluation metrics for ad hoc networks," IEEE JASC, Vol. 24, Feb. 2006, pp. 318 - 328.
-
IEEE JASC
, vol.24
, pp. 318-328
-
-
Theodorakopoulos, G.1
Baras, J.S.2
|