-
1
-
-
34548731375
-
-
Bethencourt, J., Sahai, A., & Waters, B. (2007). Ciphertext-policy attribute-based encryption. In 2007 , SP ’07 (pp. 321–334). IEEE Computer Society: Washington, DC
-
Bethencourt, J., Sahai, A., & Waters, B. (2007). Ciphertext-policy attribute-based encryption. In 2007 IEEE Symposium on Security and Privacy, SP ’07 (pp. 321–334). IEEE Computer Society: Washington, DC.
-
IEEE Symposium on Security and Privacy
-
-
-
3
-
-
77956961737
-
Secure selective group broadcast in vehicular networks using dynamic attribute based encryption
-
Chen, N., Gerla, M., Huang, D., & Hong, X. (2010). Secure selective group broadcast in vehicular networks using dynamic attribute based encryption. In The 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net) (pp. 1–8).
-
(2010)
In The 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net)
, pp. 1-8
-
-
Chen, N.1
Gerla, M.2
Huang, D.3
Hong, X.4
-
4
-
-
79957500047
-
Infotainment and road safety service support in vehicular networking: From a communication perspective
-
Cheng, H. T., Shan, H., & Zhuang, W. (2011). Infotainment and road safety service support in vehicular networking: From a communication perspective. Mechanical Systems and Signal Processing, 25(6), 2020–2038.
-
(2011)
Mechanical Systems and Signal Processing
, vol.25
, Issue.6
, pp. 2020-2038
-
-
Cheng, H.T.1
Shan, H.2
Zhuang, W.3
-
5
-
-
79958266788
-
Ppas: A privacy preservation authentication scheme for vehicle-to-infrastructure communication networks. In Consumer Electronics
-
Chuang, M.-C., & Lee, J.-F. (2011). Ppas: A privacy preservation authentication scheme for vehicle-to-infrastructure communication networks. In Consumer Electronics, Communications and Networks Conference (CECNet) (pp. 1509–1512).
-
(2011)
Communications and Networks Conference (CECNet)
, pp. 1509-1512
-
-
Chuang, M.-C.1
Lee, J.-F.2
-
7
-
-
84878789394
-
A Fuzzy logic approach to beaconing for vehicular ad hoc networks
-
Ghafoor, K. Z., Bakar, K. A., van Eenennam, M., Khokhar, R. H., & Gonzalez, A. J. (2013). A Fuzzy logic approach to beaconing for vehicular ad hoc networks. International Journal of Telecommunication Systems, 52(1), 139–149.
-
(2013)
International Journal of Telecommunication Systems
, vol.52
, Issue.1
, pp. 139-149
-
-
Ghafoor, K.Z.1
Bakar, K.A.2
van Eenennam, M.3
Khokhar, R.H.4
Gonzalez, A.J.5
-
8
-
-
77951262698
-
A TPM-based architecture for improved security and anonymity in vehicular ad hoc networks
-
Guette, G. & Heen O. (2009). A TPM-based architecture for improved security and anonymity in vehicular ad hoc networks. In 2009 IEEE Vehicular Networking Conference (VNC) (pp. 1–7).
-
(2009)
In 2009 IEEE Vehicular Networking Conference (VNC)
, pp. 1-7
-
-
Guette, G.1
Heen, O.2
-
10
-
-
66149173689
-
Lest we remember: Cold-boot attacks on encryption keys
-
Halderman, J. A., Schoen, S. D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J. A., et al. (2009). Lest we remember: Cold-boot attacks on encryption keys. Communications of the ACM, 52, 91–98.
-
(2009)
Communications of the ACM
, vol.52
, pp. 91-98
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
11
-
-
79951975426
-
A distributed key management framework with cooperative message authentication in vanets
-
Hao, Y., Chengcheng, Y., Zhou, C., & Song, W. (2011). A distributed key management framework with cooperative message authentication in vanets. IEEE Journal on Selected Areas in Communications, 29(3), 616–629.
-
(2011)
IEEE Journal on Selected Areas in Communications
, vol.29
, Issue.3
, pp. 616-629
-
-
Hao, Y.1
Chengcheng, Y.2
Zhou, C.3
Song, W.4
-
12
-
-
78650760549
-
-
Hong, X., Huang, D., Gerla, M., & Cao, Z. (2008). SAT: Situation-aware trust architecture for vehicular networks. In ’08 (pp. 31–36). ACM
-
Hong, X., Huang, D., Gerla, M., & Cao, Z. (2008). SAT: Situation-aware trust architecture for vehicular networks. In 3rd international workshop on Mobility in the evolving Internet architecture, MobiArch ’08 (pp. 31–36). ACM.
-
3rd international workshop on Mobility in the evolving Internet architecture, MobiArch
-
-
-
13
-
-
67650409731
-
ASPE: Attribute-based secure policy enforcement in vehicular ad hoc networks
-
Huang, D., & Verma, M. (2009). ASPE: Attribute-based secure policy enforcement in vehicular ad hoc networks. Ad Hoc Networks, 7(8), 1526–1535.
-
(2009)
Ad Hoc Networks
, vol.7
, Issue.8
, pp. 1526-1535
-
-
Huang, D.1
Verma, M.2
-
14
-
-
57749177974
-
Design of a network coverage analyzer for roadside-to-vehicle telematics networks. In International Conference on Software Engineering, Artificial Intelligence
-
Lee, J. (2008). Design of a network coverage analyzer for roadside-to-vehicle telematics networks. In International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, pp. 201–205.
-
(2008)
Networking, and Parallel/Distributed Computing
, pp. 201-205
-
-
Lee, J.1
-
15
-
-
51349156734
-
-
Lu, R., Lin, X., Zhu, H., Ho, P.-H., & Shen, X. (2008). ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. In 27th (pp. 1229–1237). IEEE
-
Lu, R., Lin, X., Zhu, H., Ho, P.-H., & Shen, X. (2008). ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. In 27th Conference on Computer Communications, INFOCOM (pp. 1229–1237). IEEE.
-
Conference on Computer Communications, INFOCOM
-
-
-
16
-
-
84870406370
-
Ddor: Destination discovery oriented routing in highway/freeway vanets
-
Sahu, P., Wu, E.-K., Sahoo, J., & Gerla, M. (2012). Ddor: Destination discovery oriented routing in highway/freeway vanets. Telecommunication Systems, 50, 267–284.
-
(2012)
Telecommunication Systems
, vol.50
, pp. 267-284
-
-
Sahu, P.1
Wu, E.-K.2
Sahoo, J.3
Gerla, M.4
-
17
-
-
67650661394
-
-
Saroiu, S., & Wolman, A. (2009). In 10th workshop on Mobile Computing Systems and Applications
-
Saroiu, S., & Wolman, A. (2009). Enabling new mobile applications with location proofs. In 10th workshop on Mobile Computing Systems and Applications.
-
Enabling new mobile applications with location proofs.
-
-
-
19
-
-
74549134073
-
Flexible, extensible, and efficient vanet authentication
-
Studer, A., Bai, F., Bellur, B., & Perrig, A. (2009). Flexible, extensible, and efficient vanet authentication. Journal of Communications and Networks, 11(6), 574–588.
-
(2009)
Journal of Communications and Networks
, vol.11
, Issue.6
, pp. 574-588
-
-
Studer, A.1
Bai, F.2
Bellur, B.3
Perrig, A.4
-
20
-
-
70449565205
-
Tacking together efficient authentication, revocation, and privacy in VANETs. In 6th Annual IEEE conference on Sensor
-
Studer, A., Shi, E., Bai, F., & Perrig, A. (2009). Tacking together efficient authentication, revocation, and privacy in VANETs. In 6th Annual IEEE conference on Sensor, Mesh and Ad Hoc Communications and Networks (pp. 484–492).
-
(2009)
Mesh and Ad Hoc Communications and Networks
, pp. 484-492
-
-
Studer, A.1
Shi, E.2
Bai, F.3
Perrig, A.4
-
21
-
-
77955229114
-
An identity-based security system for user privacy in vehicular ad hoc networks
-
Sun, J., Zhang, C., Zhang, Y., & Fang, Y. (2010). An identity-based security system for user privacy in vehicular ad hoc networks. IEEE Transactions on Parallel and Distributed Systems, 21(9), 1227–1239.
-
(2010)
IEEE Transactions on Parallel and Distributed Systems
, vol.21
, Issue.9
, pp. 1227-1239
-
-
Sun, J.1
Zhang, C.2
Zhang, Y.3
Fang, Y.4
-
24
-
-
20444479906
-
-
Wang, L., Wijesekera, D., & Jajodia, S. (2004). A logic-based framework for attribute based access control. In 2004 , FMSE ’04 (pp. 45–55). ACM
-
Wang, L., Wijesekera, D., & Jajodia, S. (2004). A logic-based framework for attribute based access control. In 2004 ACM workshop on Formal methods in security engineering, FMSE ’04 (pp. 45–55). ACM.
-
ACM workshop on Formal methods in security engineering
-
-
-
25
-
-
84870455609
-
The multi-copy diversity for routing in sparse vehicular ad hoc networks
-
Yoo, J., Choi, S., & Kwon Kim, C. (2012). The multi-copy diversity for routing in sparse vehicular ad hoc networks. Telecommunication Systems, 50(4), 297–309.
-
(2012)
Telecommunication Systems
, vol.50
, Issue.4
, pp. 297-309
-
-
Yoo, J.1
Choi, S.2
Kwon Kim, C.3
-
26
-
-
84870443892
-
Vehicular ad hoc networks: status, results, and challenges
-
Zeadally, S., Hunt, R., Chen, Y.-S., Irwin, A., & Hassan, A. (2012). Vehicular ad hoc networks: status, results, and challenges. Telecommunication Systems, 50(4), 217–241.
-
(2012)
Telecommunication Systems
, vol.50
, Issue.4
, pp. 217-241
-
-
Zeadally, S.1
Hunt, R.2
Chen, Y.-S.3
Irwin, A.4
Hassan, A.5
-
27
-
-
38049003527
-
-
Zhang, Y., Zhao, J., & Cao, G. (2007). In 4th ACM international workshop on Vehicular ad hoc networks, VANET ’07 (pp. 9–18). ACM
-
Zhang, Y., Zhao, J., & Cao, G. (2007). On scheduling vehicle-roadside data access. In 4th ACM international workshop on Vehicular ad hoc networks, VANET ’07 (pp. 9–18). ACM.
-
On scheduling vehicle-roadside data access.
-
-
|