메뉴 건너뛰기




Volumn , Issue , 2009, Pages 270-276

A Robust Detection of the Sybil Attack in Urban VANETs

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME;

EID: 84961361574     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDCSW.2009.48     Document Type: Conference Paper
Times cited : (82)

References (11)
  • 2
    • 33845726678 scopus 로고    scopus 로고
    • Securing vehicular ad hoc networks
    • M. Raya and J. Hubaux, “Securing vehicular ad hoc networks,” Journal of Computer Security, vol. 15, no. 1, pp. 39–68, 2007.
    • (2007) Journal of Computer Security , vol.15 , Issue.1 , pp. 39-68
    • Raya, M.1    Hubaux, J.2
  • 4
    • 3042594839 scopus 로고    scopus 로고
    • The Security and Privacy of Smart Vehicles
    • J. Hubaux et al., “The Security and Privacy of Smart Vehicles,” IEEE SECURITY & PRIVACY, pp. 49–55, 2004.
    • (2004) IEEE SECURITY & PRIVACY , pp. 49-55
    • Hubaux, J.1
  • 5
    • 4544304744 scopus 로고    scopus 로고
    • The Sybil Attack
    • Cambridge, Ma, USA, March 7-8, 2002, Revised Papers, Springer
    • J. Douceur, “The Sybil Attack,” in Peer-To-Peer Systems: First International Workshop, Iptps 2002, Cambridge, Ma, USA, March 7-8, 2002, Revised Papers, Springer, 2002.
    • (2002) Peer-To-Peer Systems: First International Workshop, Iptps , vol.2002
    • Douceur, J.1
  • 10
    • 27744445560 scopus 로고    scopus 로고
    • Group and SWARM Mobility Models for Ad Hoc Network Scenarios Using Virtual Tracks
    • B. Zhou, K. Xu, and M. Gerla, “Group and SWARM Mobility Models for Ad Hoc Network Scenarios Using Virtual Tracks,” in MILCOM, vol. 1, p. 289, 2004.
    • (2004) MILCOM , vol.1 , pp. 289
    • Zhou, B.1    Xu, K.2    Gerla, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.