-
1
-
-
14944366290
-
Pavan: A policy framework for content availabilty in vehicular ad-hoc networks
-
S. Ghandeharizadeh, S. Kapadia, and B. Krishnamachari, "Pavan: A policy framework for content availabilty in vehicular ad-hoc networks," in Veh. Ad Hoc Netw., 2004, pp. 57-65.
-
(2004)
Veh.Ad Hoc Netw.
, pp. 57-65
-
-
Ghandeharizadeh, S.1
Kapadia, S.2
Krishnamachari, B.3
-
2
-
-
69949173672
-
Static replication strategies for content availability in vehicular ad-hoc networks
-
S. Kapadia, B. Krishnamachari, and S. Ghandeharizadeh, "Static replication strategies for content availability in vehicular ad-hoc networks," MONET, vol. 14, no. 5, pp. 590-610, 2009.
-
(2009)
MONET
, vol.14
, Issue.5
, pp. 590-610
-
-
Kapadia, S.1
Krishnamachari, B.2
Ghandeharizadeh, S.3
-
3
-
-
78649430054
-
Ppc: Privacy-preserving chatting in vehicular peer-to-peer networks
-
X. Liang, R. Lu, X. Lin, and X. Shen, "Ppc: Privacy-preserving chatting in vehicular peer-to-peer networks," in VTC Fall, 2010, pp. 1-5.
-
(2010)
VTC Fall
, pp. 1-5
-
-
Liang, X.1
Lu, R.2
Lin, X.3
Shen, X.4
-
4
-
-
33845726678
-
Securing vehicular ad hoc networks
-
M. Raya and J. P. Hubaux, "Securing vehicular ad hoc networks," J. Comput. Security, vol. 15, no. 1, pp. 39-68, 2007.
-
(2007)
J. Comput. Security
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.P.2
-
5
-
-
84930198714
-
-
"Carpool," [Online]. Available: http://en.wikipedia.org/wiki/Carpool.
-
Carpool
-
-
-
6
-
-
77953313061
-
Spring: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks
-
San Diego, CA, USA, Mar.
-
R. Lu, X. Lin, and X. Shen, "Spring: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks," in INFOCOM 2010, San Diego, CA, USA, Mar. 2010, pp. 1-9.
-
(2010)
INFOCOM 2010
, pp. 1-9
-
-
Lu, R.1
Lin, X.2
Shen, X.3
-
7
-
-
70349655467
-
Spark: A new vanet-based smart parking scheme for large parking lots
-
Rio de Janeiro, Brazil, Apr.
-
R. Lu, X. Lin, H. Zhu, and X. Shen, "Spark: A new vanet-based smart parking scheme for large parking lots," in INFOCOM 2009, Rio de Janeiro, Brazil, Apr. 2009, pp. 1-9.
-
(2009)
INFOCOM 2009
, pp. 1-9
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Shen, X.4
-
8
-
-
84930208600
-
Securing vanets: Industry approaches and current research directions
-
New York, NY, USA: ACM
-
A. Perrig, "Securing vanets: Industry approaches and current research directions," in VANET '09. New York, NY, USA: ACM, 2009, pp. 1-2.
-
(2009)
VANET '09
, pp. 1-2
-
-
Perrig, A.1
-
9
-
-
36749076982
-
Gsis: A secure and privacy-preserving protocol for vehicular communications
-
X. Lin, X. Sun, P.-H. Ho, and X. Shen, "Gsis: A secure and privacy-preserving protocol for vehicular communications," IEEE Trans. Veh. Technol., vol. 56, no. 6, pp. 3442-3456, 2007.
-
(2007)
IEEE Trans. Veh. Technol.
, vol.56
, Issue.6
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.-H.3
Shen, X.4
-
10
-
-
51349156734
-
Ecpp: Efficient conditional privacy preservation protocol for secure vehicular communications
-
Phoenix, AZ, USA, Apr.
-
R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, "Ecpp: Efficient conditional privacy preservation protocol for secure vehicular communications," in INFOCOM 2008, Phoenix, AZ, USA, Apr. 2008.
-
(2008)
INFOCOM 2008
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Ho, P.-H.4
Shen, X.5
-
11
-
-
3042785862
-
The sybil attack in sensor networks: Analysis & defenses
-
New York, NY, USA: ACM
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: Analysis & defenses," in IPSN '04. New York, NY, USA: ACM, 2004, pp. 259-268.
-
(2004)
IPSN '04
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
12
-
-
77953686613
-
Sybillimit: A near-optimal social network defense against sybil attacks
-
H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao, "Sybillimit: A near-optimal social network defense against sybil attacks," IEEE/ACM Trans. Netw., vol. 18, no. 3, pp. 885-898, 2010.
-
(2010)
IEEE/ACM Trans.Netw.
, vol.18
, Issue.3
, pp. 885-898
-
-
Yu, H.1
Gibbons, P.B.2
Kaminsky, M.3
Xiao, F.4
-
13
-
-
77953317298
-
Sybil attacks against mobile users: Friends and foes to the rescue
-
SanDiego, CA,USA,Mar.
-
D. Quercia and S. Hailes, "Sybil attacks against mobile users: Friends and foes to the rescue," in INFOCOM 2010, SanDiego, CA,USA,Mar. 2010, pp. 1-9.
-
(2010)
INFOCOM 2010
, pp. 1-9
-
-
Quercia, D.1
Hailes, S.2
-
14
-
-
50249168206
-
Privacy-preserving detection of sybil attacks in vehicular ad hoc networks
-
Washington, DC, USA
-
T. Zhou, R. R. Choudhury, P. Ning, and K. Chakrabarty, "Privacy-preserving detection of sybil attacks in vehicular ad hoc networks," in MOBIQUITOUS '07, Washington, DC, USA, 2007, pp. 1-8.
-
(2007)
MOBIQUITOUS '07
, pp. 1-8
-
-
Zhou, T.1
Choudhury, R.R.2
Ning, P.3
Chakrabarty, K.4
-
15
-
-
77951463026
-
Defense against sybil attack in vehicular ad-hoc network based on roadside units support
-
S. Park, B. Aslam, D. Turgut, and C. C. Zou, "Defense against sybil attack in vehicular ad-hoc network based on roadside units support," in MILCOM'09, 2009.
-
(2009)
MILCOM'09
-
-
Park, S.1
Aslam, B.2
Turgut, D.3
Zou, C.C.4
-
16
-
-
70449565205
-
TACKing together efficient authentication, revocation, and privacy in vanets
-
A. Studer, E. Shi, F. Bai, and A. Perrig, "TACKing together efficient authentication, revocation, and privacy in vanets," in SECON'09, 2009.
-
(2009)
SECON'09
-
-
Studer, A.1
Shi, E.2
Bai, F.3
Perrig, A.4
-
17
-
-
78649253198
-
Privacy vulnerabilities of published anonymous mobility traces
-
C. Ma, D. Yau, N. Yip, and N. Rao, "Privacy vulnerabilities of published anonymous mobility traces," in MobiCom 2010, 2010.
-
(2010)
MobiCom 2010
-
-
Ma, C.1
Yau, D.2
Yip, N.3
Rao, N.4
-
18
-
-
77249157951
-
Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications
-
Q. Wu, J. Domingo-Ferrer, and U. Gonzalez-Nicolas, "Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications," IEEE Trans. Veh. Technol., vol. 59, no. 2, pp. 559-573, 2010.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.2
, pp. 559-573
-
-
Wu, Q.1
Domingo-Ferrer, J.2
Gonzalez-Nicolas, U.3
-
19
-
-
79951969637
-
Threshold anonymous announcement in vanets
-
L. Chen, S.-L. Ng, and G. Wang, "Threshold anonymous announcement in vanets," IEEE J. Sel. Areas Commun., vol. 29, no. 3, pp. 605-615, 2011.
-
(2011)
IEEE J. Sel. Areas Commun.
, vol.29
, Issue.3
, pp. 605-615
-
-
Chen, L.1
Ng, S.-L.2
Wang, G.3
-
21
-
-
34247602959
-
Performance modeling of epidemic routing
-
X. Zhang, G. Neglia, J. Kurose, and D. Towsley, "Performance modeling of epidemic routing," Comput. Netw., vol. 51, no. 10, pp. 2867-2891, 2007.
-
(2007)
Comput. Netw.
, vol.51
, Issue.10
, pp. 2867-2891
-
-
Zhang, X.1
Neglia, G.2
Kurose, J.3
Towsley, D.4
-
22
-
-
14844309671
-
Group signatures with verifier-local revocation
-
New York, NY, USA: ACM
-
D. Boneh and H. Shacham, "Group signatures with verifier-local revocation," in CCS '04. New York, NY, USA: ACM, 2004, pp. 168-177.
-
(2004)
CCS '04
, pp. 168-177
-
-
Boneh, D.1
Shacham, H.2
-
23
-
-
78650759659
-
Relays, base stations, and meshes: Enhancing mobile networks with infrastructure
-
San Francisco, USA
-
N. Banerjee, M. D. Corner, D. Towsley, and B. N. Levine, "Relays, base stations, and meshes: Enhancing mobile networks with infrastructure," in MobiCom 2008, San Francisco, USA, 2008, pp. 81-91.
-
(2008)
MobiCom 2008
, pp. 81-91
-
-
Banerjee, N.1
Corner, M.D.2
Towsley, D.3
Levine, B.N.4
-
24
-
-
70350662582
-
Spatio-temporal variations of vehicle traffic in vanets: Facts and implications
-
F. Bai and B. Krishnamachari, "Spatio-temporal variations of vehicle traffic in vanets: Facts and implications," in VANET '09, pp. 43-52.
-
VANET '09
, pp. 43-52
-
-
Bai, F.1
Krishnamachari, B.2
-
25
-
-
77953309373
-
Recongnizing exponential inter-contact time in vanets
-
San Diego, CA, USA, Mar.
-
H. Zhu, L. Fu, G. Xue, Y. Zhu, M. Li, and L. Ni, "Recongnizing exponential inter-contact time in vanets," in INFOCOM 2010, San Diego, CA, USA, Mar. 2010, pp. 1-9.
-
(2010)
INFOCOM 2010
, pp. 1-9
-
-
Zhu, H.1
Fu, L.2
Xue, G.3
Zhu, Y.4
Li, M.5
Ni, L.6
-
26
-
-
34548120584
-
Delay and resource analysis in manets in presence of throwboxes
-
M. Ibrahim, A. Al Hanbali, and P. Nain, "Delay and resource analysis in manets in presence of throwboxes," Performance Evaluation, vol. 64, no. 9-12, pp. 933-947, 2007.
-
(2007)
Performance Evaluation
, vol.64
, Issue.9-12
, pp. 933-947
-
-
Ibrahim, M.1
Al Hanbali, A.2
Nain, P.3
-
28
-
-
59249108565
-
Security certificate revocation list distribution for vanet
-
K. P. Laberteaux, J. J. Haas, and Y.-C. Hu, "Security certificate revocation list distribution for vanet," in VANET '08, pp. 88-89.
-
VANET '08
, pp. 88-89
-
-
Laberteaux, K.P.1
Haas, J.J.2
Hu, Y.-C.3
-
29
-
-
24144497473
-
The message delay in mobile ad hoc networks
-
R. Groenevelt, P. Nain, and G. Koole, "The message delay in mobile ad hoc networks," Perform. Eval., vol. 62, no. 1-4, pp. 210-228, 2005.
-
(2005)
Perform. Eval.
, vol.62
, Issue.1-4
, pp. 210-228
-
-
Groenevelt, R.1
Nain, P.2
Koole, G.3
-
30
-
-
0008352491
-
A linkable group signature and its application to secret voting
-
T. Nakanishi, T. Fujiwara, and H. Watanabe, "A linkable group signature and its application to secret voting," Trans. Inf. Process. Society Japan, vol. 40, no. 7, pp. 3085-3096, 1999.
-
(1999)
Trans. Inf. Process. Society Japan
, vol.40
, Issue.7
, pp. 3085-3096
-
-
Nakanishi, T.1
Fujiwara, T.2
Watanabe, H.3
|