-
5
-
-
84864682117
-
Design, implementation, and evaluation of a vehicular hardware security module
-
LNCS, H. Kim, Ed Springer Berlin Heidelberg, Jan
-
M. Wolf and T. Gendrullis, "Design, implementation, and evaluation of a vehicular hardware security module, " in Information Security and Cryptology-ICISC 2011, ser. LNCS, H. Kim, Ed. Springer Berlin Heidelberg, Jan. 2012, no. 7259, pp. 302-318.
-
(2012)
Information Security and Cryptology-ICISC 2011
, vol.7259
, pp. 302-318
-
-
Wolf, M.1
Gendrullis, T.2
-
6
-
-
35348977820
-
Eviction of misbehaving and faulty nodes in vehicular networks
-
Oct
-
M. Raya, P. Papadimitratos, I. Aad, D. Jungels, and J.-P. Hubaux, "Eviction of misbehaving and faulty nodes in vehicular networks, " IEEE J. Sel. Areas Commun., vol. 25, no. 8, pp. 1557-1568, Oct. 2007.
-
(2007)
IEEE J. Sel. Areas Commun
, vol.25
, Issue.8
, pp. 1557-1568
-
-
Raya, M.1
Papadimitratos, P.2
Aad, I.3
Jungels, D.4
Hubaux, J.-P.5
-
7
-
-
85017030634
-
Misbehavior detection in vehicular ad-hoc networks
-
Innsbruck, Austria, Tech. Rep. CCS- 2013-01, Feb
-
R. W. van der Heijden, S. Dietzel, and F. Kargl, "Misbehavior detection in vehicular ad-hoc networks, " Proceedings of the 1st GI/ITG KuVS Fachgespäch Inter-Vehicle Communication, Innsbruck, Austria, Tech. Rep. CCS-2013-01, Feb. 2013.
-
(2013)
Proceedings of the 1st GI/ITG KuVS Fachgespäch Inter-Vehicle Communication
-
-
Der Van Heijden, R.W.1
Dietzel, S.2
Kargl, F.3
-
8
-
-
37149012633
-
On datacentric trust establishment in ephemeral ad hoc networks
-
M. Raya, P. Papadimitratos, V. D. Gligor, and J.-P. Hubaux, "On datacentric trust establishment in ephemeral ad hoc networks, " in IEEE 27th Conference on Computer Communications, 2008, pp. 1238-1246.
-
(2008)
IEEE 27th Conference on Computer Communications
, pp. 1238-1246
-
-
Raya, M.1
Papadimitratos, P.2
Gligor, V.D.3
Hubaux, J.-P.4
-
9
-
-
77958527044
-
Decentralized position verification in geographic ad hoc routing
-
T. Leinmüller, E. Schoch, F. Kargl, and C. Maihöfer, "Decentralized position verification in geographic ad hoc routing, " Security and Communication Networks, vol. 3, no. 4, pp. 289-302, 2010.
-
(2010)
Security and Communication Networks
, vol.3
, Issue.4
, pp. 289-302
-
-
Leinmüller, T.1
Schoch, E.2
Kargl, F.3
Maihöfer, C.4
-
10
-
-
14944372809
-
Detecting and correcting malicious data in VANETs
-
P. Golle, D. Greene, and J. Staddon, "Detecting and correcting malicious data in VANETs, " in Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks. ACM, 2004, p. 29-37.
-
(2004)
Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks. ACM
, pp. 29-37
-
-
Golle, P.1
Greene, D.2
Staddon, J.3
-
12
-
-
84857611312
-
A two-stage verification process for car-To-x mobility data based on path prediction and probabilistic maneuver recognition
-
H. Stübing, J. Firl, and S. A. Huss, "A two-stage verification process for car-To-x mobility data based on path prediction and probabilistic maneuver recognition, " in Vehicular Networking Conference. IEEE, 2011, pp. 17-24.
-
(2011)
Vehicular Networking Conference IEEE
, pp. 17-24
-
-
Stübing, H.1
Firl, J.2
Huss, S.A.3
-
13
-
-
78649284515
-
Detecting misbehaviors in VANET with integrated root-cause analysis
-
Sep.
-
M. Ghosh, A. Varghese, A. Gupta, A. A. Kherani, and S. N. Muthaiah, "Detecting misbehaviors in VANET with integrated root-cause analysis, " Ad Hoc Networks, vol. 8, no. 7, pp. 778-790, Sep. 2010.
-
(2010)
Ad Hoc Networks
, vol.8
, Issue.7
, pp. 778-790
-
-
Ghosh, M.1
Varghese, A.2
Gupta, A.3
Kherani, A.A.4
Muthaiah, S.N.5
-
14
-
-
78649311194
-
A trust model for intervehicular communication based on belief theory
-
W. Bamberger, J. Schlittenlacher, and K. Diepold, "A trust model for intervehicular communication based on belief theory, " in IEEE Second International Conference on Social Computing, 2010, pp. 73-80.
-
(2010)
IEEE Second International Conference on Social Computing
, pp. 73-80
-
-
Bamberger, W.1
Schlittenlacher, J.2
Diepold, K.3
-
19
-
-
34247376546
-
Improved security in geographic ad hoc routing through autonomous position verification
-
T. Leinmüller, C. Maihöfer, E. Schoch, and F. Kargl, "Improved security in geographic ad hoc routing through autonomous position verification, " in Proceedings of the 3rd international workshop on Vehicular ad hoc networks. New York, New York, USA: ACM Press, 2006, pp. 57-66.
-
(2006)
Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks. New York, New York, USA: ACM Press
, pp. 57-66
-
-
Leinmüller, T.1
Maihöfer, C.2
Schoch, E.3
Kargl, F.4
-
20
-
-
84855362954
-
A framework for trust assessment of sensor data
-
L. Gomez, X. Gentile, and M. Riveill, "A framework for trust assessment of sensor data, " in 4th Joint IFIP Wireless and Mobile Networking Conference, 2011, pp. 1-7.
-
(2011)
4th Joint IFIP Wireless and Mobile Networking Conference
, pp. 1-7
-
-
Gomez, L.1
Gentile, X.2
Riveill, M.3
|