-
1
-
-
84896828997
-
-
U.S. Department of Transportation-Research and Innovative Technology Administration. Vehicle-to-Vehicle (V2V) Communications for Safety.
-
U.S. Department of Transportation-Research and Innovative Technology Administration. Vehicle-to-Vehicle (V2V) Communications for Safety. [Online]. Available: www.its.dot.gov/research/v2v.htm
-
-
-
-
2
-
-
84883747975
-
A generic public key infrastructure for securing car-to-x communication
-
N. BiBmeyer, H. Stiibing, E. Schoch, S. Gotz, J. P. Stolz, and B. Lonc, "A generic public key infrastructure for securing Car-to-X communication," in 18th World Congress on Intelligent Transport Systems, 2011.
-
(2011)
18th World Congress on Intelligent Transport Systems
-
-
Bibmeyer, N.1
Stiibing, H.2
Schoch, E.3
Gotz, S.4
Stolz, J.P.5
Lonc, B.6
-
6
-
-
84896842281
-
-
Secure Vehicle Communication. Security Architecture and Mechanisms for V2VIY2I.
-
Secure Vehicle Communication. Security Architecture and Mechanisms for V2VIY2I. [Online]. Available: www.sevecom.orglDeliverables/Sevecom-Deliverable- D2.L v3.0. pd f
-
-
-
-
8
-
-
84896829374
-
-
1609.2. Annex E.4.I: Why sign data instead of using a message authentication code? [Online]. Available: standards.ieee.org/findstds/standard/ 1609.2-2013.html
-
1609.2. Annex E.4.I: Why sign data instead of using a message authentication code? [Online]. Available: standards.ieee.org/findstds/standard/ 1609.2-2013.html
-
-
-
-
9
-
-
84896816330
-
-
U.S. Department of Transportation. Safety Pilot Model Deployment. [Online]. Available: safetypilot.umtri.umich.edul
-
U.S. Department of Transportation. Safety Pilot Model Deployment. [Online]. Available: safetypilot.umtri.umich.edul
-
-
-
-
10
-
-
60149092949
-
Wireless device identification with radiometric signatures
-
v. Brik, S. Banerjee, M. Gruteser, and S. Oh, "Wireless device identification with radiometric signatures," in MOBICOM, 2008, pp. 116-127.
-
(2008)
MOBICOM
, pp. 116-127
-
-
Brik, V.1
Banerjee, S.2
Gruteser, M.3
Oh, S.4
-
11
-
-
84947273682
-
The sybil attack
-
J. R. Douceur, "The sybil attack," in IPTPS, 2002, pp. 251-260.
-
(2002)
IPTPS
, pp. 251-260
-
-
Douceur, J.R.1
-
12
-
-
84896874501
-
-
IEEE. (2000) Std 1363-2000, standard specifications for public-key cryptography. [Online]. Available: ieeexplore.ieee.org/xpl/articleDetails.jsp? arnumber=891000&contentType=Standards
-
IEEE. (2000) Std 1363-2000, standard specifications for public-key cryptography. [Online]. Available: ieeexplore.ieee.org/xpl/articleDetails.jsp? arnumber=891000&contentType=Standards
-
-
-
-
13
-
-
84896867429
-
-
National Institute of Standards and Technology. (1999, July) Recommended elliptic curves for federal government use. [Online]. Available: csrc.nist.gov/groups/ST/toolkit/documents/dss/NISTReCur.doc
-
National Institute of Standards and Technology. (1999, July) Recommended elliptic curves for federal government use. [Online]. Available: csrc.nist.gov/groups/ST/toolkit/documents/dss/NISTReCur.doc
-
-
-
-
15
-
-
84896857687
-
-
Wikipedia. Hardware security module. [Online]. Available: en. wikipedia.orglwikilHardware-security -module
-
Wikipedia. Hardware security module. [Online]. Available: en. wikipedia.orglwikilHardware-security -module
-
-
-
-
16
-
-
84896821263
-
-
Anonymous. Defensive publication.
-
Anonymous. Defensive publication. [Online]. Available: priorartdatabase. com/pub View/lPCOM00021 0877D
-
-
-
|