-
1
-
-
33845726678
-
Securing vehicular ad hoc networks
-
M. Raya and J.-P. Hubaux, "Securing vehicular ad hoc networks," Journal of Computer Security, vol. 15, no. 1, pp. 39-68, 2007.
-
(2007)
Journal of Computer Security
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.-P.2
-
2
-
-
80052737225
-
Security on vanets: Privacy, misbehaving nodes, false information and secure data aggregation
-
D. Antolino Rivas, J. M. Barceĺo-Ordinas, M. Guerrero Zapata, and J. D. Morillo-Pozo, "Security on vanets: Privacy, misbehaving nodes, false information and secure data aggregation," Journal of Network and Computer Applications, vol. 34, no. 6, pp. 1942-1955, 2011.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.6
, pp. 1942-1955
-
-
Antolino Rivas, D.1
Barceĺo-Ordinas, J.M.2
Guerrero Zapata, M.3
Morillo-Pozo, J.D.4
-
3
-
-
84885887667
-
Towards autonomous vehicular clouds
-
Springer
-
M. Eltoweissy, S. Olariu, and M. Younis, "Towards autonomous vehicular clouds," in Ad Hoc Networks. Springer, 2010, pp. 1-16.
-
(2010)
Ad Hoc Networks
, pp. 1-16
-
-
Eltoweissy, M.1
Olariu, S.2
Younis, M.3
-
4
-
-
84874273920
-
Rethinking vehicular communications: Merging vanet with cloud computing
-
R. Hussain, J. Son, H. Eun, S. Kim, and H. Oh, "Rethinking vehicular communications: Merging vanet with cloud computing," in Cloud Computing Technology and Science (CloudCom), 2012 IEEE 4th International Conference on. IEEE, 2012, pp. 606-609.
-
(2012)
Cloud Computing Technology and Science (CloudCom) 2012 IEEE 4th International Conference On. IEEE
, pp. 606-609
-
-
Hussain, R.1
Son, J.2
Eun, H.3
Kim, S.4
Oh, H.5
-
5
-
-
84881294271
-
Tiaas: Secure cloud-assisted traffic information dissemination in vehicular ad hoc networks
-
R. Hussain, F. Abbas, J. Son, and H. Oh, "Tiaas: Secure cloud-assisted traffic information dissemination in vehicular ad hoc networks," in Cluster Computing and the Grid, IEEE International Symposium on. IEEE, 2013, pp. 178-179.
-
(2013)
Cluster Computing and the Grid, IEEE International Symposium On. IEEE
, pp. 178-179
-
-
Hussain, R.1
Abbas, F.2
Son, J.3
Oh, H.4
-
6
-
-
84877599654
-
Pics-on-wheels: Photo surveillance in the vehicular cloud
-
M. Gerla, J.-T. Weng, and G. Pau, "Pics-on-wheels: Photo surveillance in the vehicular cloud," in Computing, Networking and Communications (ICNC), 2013 International Conference on. IEEE, 2013, pp. 1123-1127.
-
(2013)
Computing, Networking and Communications (ICNC), 2013 International Conference On. IEEE
, pp. 1123-1127
-
-
Gerla, M.1
Weng, J.-T.2
Pau, G.3
-
7
-
-
36349002968
-
Support of anonymity in vanets-putting pseudonymity into practice
-
E. Fonseca, A. Festag, R. Baldessari, and R. L. Aguiar, "Support of anonymity in vanets-putting pseudonymity into practice," in Wireless Communications and Networking Conference, 2007. WCNC 2007. IEEE. IEEE, 2007, pp. 3400-3405.
-
(2007)
Wireless Communications and Networking Conference 2007. WCNC 2007. IEEE. IEEE
, pp. 3400-3405
-
-
Fonseca, E.1
Festag, A.2
Baldessari, R.3
Aguiar, R.L.4
-
8
-
-
58149135996
-
Pseudonym-on-demand: A new pseudonym refill strategy for vehicular communications
-
Z. Ma, F. Kargl, and M. Weber, "Pseudonym-on-demand: A new pseudonym refill strategy for vehicular communications," in Vehicular Technology Conference, 2008. VTC 2008-Fall. IEEE 68th. IEEE, 2008, pp. 1-5.
-
(2008)
Vehicular Technology Conference 2008. VTC 2008-Fall. IEEE 68th. IEEE
, pp. 1-5
-
-
Ma, Z.1
Kargl, F.2
Weber, M.3
-
10
-
-
76649136148
-
Towards privacy aware pseudonymless strategy for avoiding profile generation in vanet
-
Springer
-
R. Hussain, S. Kim, and H. Oh, "Towards privacy aware pseudonymless strategy for avoiding profile generation in vanet," in Information Security Applications. Springer, 2009, pp. 268-280.
-
(2009)
Information Security Applications
, pp. 268-280
-
-
Hussain, R.1
Kim, S.2
Oh, H.3
-
11
-
-
77952124972
-
Privacy in inter-vehicular networks: Why simple pseudonym change is not enough
-
B. Wiedersheim, Z. Ma, F. Kargl, and P. Papadimitratos, "Privacy in inter-vehicular networks: Why simple pseudonym change is not enough," in Wireless On-demand Network Systems and Services (WONS), 2010 Seventh International Conference on. IEEE, 2010, pp. 176-183.
-
(2010)
Wireless On-demand Network Systems and Services (WONS), 2010 Seventh International Conference On. IEEE
, pp. 176-183
-
-
Wiedersheim, B.1
Ma, Z.2
Kargl, F.3
Papadimitratos, P.4
-
12
-
-
79951786774
-
Strong and affordable location privacy in vanets: Identity diffusion using timeslots and swapping
-
D. Eckhoff, C. Sommer, T. Gansen, R. German, and F. Dressler, "Strong and affordable location privacy in vanets: Identity diffusion using timeslots and swapping," in Vehicular Networking Conference (VNC), 2010 IEEE. IEEE, 2010, pp. 174-181.
-
(2010)
Vehicular Networking Conference (VNC) 2010 IEEE. IEEE
, pp. 174-181
-
-
Eckhoff, D.1
Sommer, C.2
Gansen, T.3
German, R.4
Dressler, F.5
-
13
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," Information Theory, IEEE Transactions on, vol. 31, no. 4, pp. 469-472, 1985.
-
(1985)
Information Theory, IEEE Transactions on
, vol.31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
15
-
-
51449098979
-
An efficient identitybased batch verification scheme for vehicular sensor networks
-
C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. Shen, "An efficient identitybased batch verification scheme for vehicular sensor networks," in INFOCOM 2008. The 27th Conference on Computer Communications. IEEE. IEEE, 2008, pp. 246-250.
-
(2008)
INFOCOM 2008. The 27th Conference on Computer Communications. IEEE. IEEE
, pp. 246-250
-
-
Zhang, C.1
Lu, R.2
Lin, X.3
Ho, P.-H.4
Shen, X.5
-
16
-
-
79960869427
-
On full-view coverage in camera sensor networks
-
Y. Wang and G. Cao, "On full-view coverage in camera sensor networks," in INFOCOM, 2011 Proceedings IEEE. IEEE, 2011, pp. 1781-1789.
-
(2011)
INFOCOM, 2011 Proceedings IEEE. IEEE
, pp. 1781-1789
-
-
Wang, Y.1
Cao, G.2
-
18
-
-
77951259485
-
Mutual identification and key exchange scheme in secure vanets based on group signature
-
D. Kim, J. Choi, and S. Jung, "Mutual identification and key exchange scheme in secure vanets based on group signature," in Consumer Communications and Networking Conference (CCNC), 2010 7th IEEE. IEEE, 2010, pp. 1-2.
-
(2010)
Consumer Communications and Networking Conference (CCNC) 2010 7th IEEE. IEEE
, pp. 1-2
-
-
Kim, D.1
Choi, J.2
Jung, S.3
|