-
1
-
-
3042785862
-
The sybil attack in sensor networks: analysis & defenses
-
ACM Press New York, NY, USA
-
J. Newsome, E. Shi, D. Song, and A. Perrig, “The sybil attack in sensor networks: analysis & defenses,” in Proceedings of the third international symposium on Information processing in sensor networks, pp. 259–268, ACM Press New York, NY, USA, 2004.
-
(2004)
Proceedings of the third international symposium on Information processing in sensor networks
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
2
-
-
33845726678
-
Securing vehicular ad hoc networks
-
M. Raya and J. Hubaux, “Securing vehicular ad hoc networks,” Journal of Computer Security, vol. 15, no. 1, pp. 39–68, 2007.
-
(2007)
Journal of Computer Security
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.2
-
4
-
-
3042594839
-
The Security and Privacy of Smart Vehicles
-
J. Hubaux et al., “The Security and Privacy of Smart Vehicles,” IEEE SECURITY & PRIVACY, pp. 49–55, 2004.
-
(2004)
IEEE SECURITY & PRIVACY
, pp. 49-55
-
-
Hubaux, J.1
-
5
-
-
4544304744
-
The Sybil Attack
-
Cambridge, Ma, USA, March 7-8, 2002, Revised Papers, Springer
-
J. Douceur, “The Sybil Attack,” in Peer-To-Peer Systems: First International Workshop, Iptps 2002, Cambridge, Ma, USA, March 7-8, 2002, Revised Papers, Springer, 2002.
-
(2002)
Peer-To-Peer Systems: First International Workshop, Iptps
, vol.2002
-
-
Douceur, J.1
-
6
-
-
14944372809
-
Detecting and correcting malicious data in VANETs
-
ACM New York, NY, USA
-
P. Golle, D. Greene, and J. Staddon, “Detecting and correcting malicious data in VANETs,” in Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks, pp. 29–37, ACM New York, NY, USA, 2004.
-
(2004)
Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks
, pp. 29-37
-
-
Golle, P.1
Greene, D.2
Staddon, J.3
-
7
-
-
33845926634
-
An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks
-
IEEE Computer Society Washington, DC, USA
-
M. Demirbas and Y. Song, “An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks,” in Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks, pp. 564–570, IEEE Computer Society Washington, DC, USA, 2006.
-
(2006)
Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
, pp. 564-570
-
-
Demirbas, M.1
Song, Y.2
-
8
-
-
85002940040
-
Detection and localization of sybil nodes in VANETs
-
ACM New York, NY, USA
-
B. Xiao, B. Yu, and C. Gao, “Detection and localization of sybil nodes in VANETs,” in Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks, pp. 1–8, ACM New York, NY, USA, 2006.
-
(2006)
Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks
, pp. 1-8
-
-
Xiao, B.1
Yu, B.2
Gao, C.3
-
10
-
-
27744445560
-
Group and SWARM Mobility Models for Ad Hoc Network Scenarios Using Virtual Tracks
-
B. Zhou, K. Xu, and M. Gerla, “Group and SWARM Mobility Models for Ad Hoc Network Scenarios Using Virtual Tracks,” in MILCOM, vol. 1, p. 289, 2004.
-
(2004)
MILCOM
, vol.1
, pp. 289
-
-
Zhou, B.1
Xu, K.2
Gerla, M.3
|