-
1
-
-
84941085241
-
Internet of Things: A survey on enabling technologies, protocols, and applications
-
4th Quart.
-
A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, "Internet of Things: A survey on enabling technologies, protocols, and applications," IEEE Commun. Surveys Tuts., vol. 17, no. 4, pp. 2347-2376, 4th Quart., 2015.
-
(2015)
IEEE Commun. Surveys Tuts.
, vol.17
, Issue.4
, pp. 2347-2376
-
-
Al-Fuqaha, A.1
Guizani, M.2
Mohammadi, M.3
Aledhari, M.4
Ayyash, M.5
-
2
-
-
84954308584
-
Mobile crowd sensing for traffic prediction in Internet of vehicles
-
Art. no. 88
-
J. Wan et al., "Mobile crowd sensing for traffic prediction in Internet of vehicles," Sensors, vol. 16, no. 1, 2016, Art. no. 88.
-
(2016)
Sensors
, vol.16
, Issue.1
-
-
Wan, J.1
-
3
-
-
85007015710
-
-
School Comput. Sci., Carnegie Mellon Univ., Pittsburgh, PA, USA, Tech. Rep. CMU-CS-15-139
-
Y. Gao et al., "Are cloudlets necessary?" School Comput. Sci., Carnegie Mellon Univ., Pittsburgh, PA, USA, Tech. Rep. CMU-CS-15-139, 2015.
-
(2015)
Are Cloudlets Necessary?
-
-
Gao, Y.1
-
4
-
-
84976471358
-
Vehicular fog computing: A viewpoint of vehicles as the infrastructures
-
Jun.
-
X. Hou, Y. Li, M. Chen, D. Wu, D. Jin, and S. Chen, "Vehicular fog computing: A viewpoint of vehicles as the infrastructures," IEEE Trans. Veh. Technol., vol. 65, no. 6, pp. 3860-3873, Jun. 2016.
-
(2016)
IEEE Trans. Veh. Technol.
, vol.65
, Issue.6
, pp. 3860-3873
-
-
Hou, X.1
Li, Y.2
Chen, M.3
Wu, D.4
Jin, D.5
Chen, S.6
-
5
-
-
84962579256
-
MixGroup: Accumulative pseudonym exchanging for location privacy enhancement in vehicular social networks
-
Jan.
-
R. Yu, J. Kang, X. Huang, S. Xie, Y. Zhang, and S. Gjessing, "MixGroup: Accumulative pseudonym exchanging for location privacy enhancement in vehicular social networks," IEEE Trans. Depend. Sec. Comput., vol. 13, no. 1, pp. 93-105, Jan. 2016.
-
(2016)
IEEE Trans. Depend. Sec. Comput.
, vol.13
, Issue.1
, pp. 93-105
-
-
Yu, R.1
Kang, J.2
Huang, X.3
Xie, S.4
Zhang, Y.5
Gjessing, S.6
-
6
-
-
84925855850
-
Pseudonym schemes in vehicular networks: A survey
-
1st Quart.
-
J. Petit, F. Schaub, M. Feiri, and F. Kargl, "Pseudonym schemes in vehicular networks: A survey," IEEE Commun. Surveys Tuts., vol. 17, no. 1, pp. 228-255, 1st Quart., 2015.
-
(2015)
IEEE Commun. Surveys Tuts.
, vol.17
, Issue.1
, pp. 228-255
-
-
Petit, J.1
Schaub, F.2
Feiri, M.3
Kargl, F.4
-
7
-
-
74049097109
-
On non-cooperative location privacy: A gametheoretic analysis
-
J. Freudiger et al., "On non-cooperative location privacy: A gametheoretic analysis," in Proc. ACM CCS, 2009, pp. 324-337.
-
(2009)
Proc. ACM CCS
, pp. 324-337
-
-
Freudiger, J.1
-
8
-
-
74949136373
-
Mix-zones for location privacy in vehicular networks
-
J. Freudiger, M. Raya, M. Félegyházi, P. Papadimitratos, and J.-P. Hubaux, "Mix-zones for location privacy in vehicular networks," in Proc. Int. Workshop WiN-ITS, 2007, pp. 1-7.
-
(2007)
Proc. Int. Workshop WiN-ITS
, pp. 1-7
-
-
Freudiger, J.1
Raya, M.2
Félegyházi, M.3
Papadimitratos, P.4
Hubaux, J.-P.5
-
9
-
-
84857789593
-
A dynamic privacy-preserving key management scheme for location-based services in VANETs
-
Mar.
-
R. Lu, X. Lin, X. Liang, and X. Shen, "A dynamic privacy-preserving key management scheme for location-based services in VANETs," IEEE Trans. Intell. Transp. Syst., vol. 13, no. 1, pp. 127-139, Mar. 2012.
-
(2012)
IEEE Trans. Intell. Transp. Syst.
, vol.13
, Issue.1
, pp. 127-139
-
-
Lu, R.1
Lin, X.2
Liang, X.3
Shen, X.4
-
10
-
-
77951259549
-
SLOW: A practical pseudonym changing scheme for location privacy in VANETs
-
Oct.
-
L. Buttyán, T. Holczer, A. Weimerskirch, and W. Whyte, "SLOW: A practical pseudonym changing scheme for location privacy in VANETs," in Proc. IEEE VNC, Oct. 2009, pp. 1-8.
-
(2009)
Proc. IEEE VNC
, pp. 1-8
-
-
Buttyán, L.1
Holczer, T.2
Weimerskirch, A.3
Whyte, W.4
-
11
-
-
84856182115
-
Pseudonym changing at social spots: An effective strategy for location privacy in VANETs
-
Jan.
-
R. Lu, X. Lin, T. H. Luan, X. Liang, and X. Shen, "Pseudonym changing at social spots: An effective strategy for location privacy in VANETs," IEEE Trans. Veh. Technol., vol. 61, no. 1, pp. 86-96, Jan. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.1
, pp. 86-96
-
-
Lu, R.1
Lin, X.2
Luan, T.H.3
Liang, X.4
Shen, X.5
-
12
-
-
33845726678
-
Securing vehicular ad hoc networks
-
M. Raya and J.-P. Hubaux, "Securing vehicular ad hoc networks," J. Comput. Secur., vol. 15, no. 1, pp. 39-68, 2007.
-
(2007)
J. Comput. Secur.
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.-P.2
-
13
-
-
84959900865
-
An efficient anonymous batch authentication scheme based on HMAC for VANETs
-
Aug.
-
S. Jiang, X. Zhu, and L. Wang, "An efficient anonymous batch authentication scheme based on HMAC for VANETs," IEEE Trans. Intell. Transp. Syst., vol. 17, no. 8, pp. 2193-2204, Aug. 2016.
-
(2016)
IEEE Trans. Intell. Transp. Syst.
, vol.17
, Issue.8
, pp. 2193-2204
-
-
Jiang, S.1
Zhu, X.2
Wang, L.3
-
14
-
-
84949627105
-
Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing
-
Jan.
-
K. Gai, M. Qiu, H. Zhao, L. Tao, and Z. Zong, "Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing," J. Netw. Comput. Appl., vol. 59, pp. 46-54, Jan. 2016.
-
(2016)
J. Netw. Comput. Appl.
, vol.59
, pp. 46-54
-
-
Gai, K.1
Qiu, M.2
Zhao, H.3
Tao, L.4
Zong, Z.5
-
15
-
-
84957592886
-
A fog based system model for cooperative IoT node pairing using matching theory
-
2015
-
S. F. Abedin, M. G. R. Alam, N. H. Tran, and C. S. Hong, "A fog based system model for cooperative IoT node pairing using matching theory," in Proc. APNOMS, 2015, pp. 309-314.
-
Proc. APNOMS
, pp. 309-314
-
-
Abedin, S.F.1
Alam, M.G.R.2
Tran, N.H.3
Hong, C.S.4
-
16
-
-
78651449231
-
Privacy and anonymity in VANETs: A contemporary study
-
S. Biswas et al., "Privacy and anonymity in VANETs: A contemporary study," Ad Hoc Sens. Wireless Netw., vol. 10, nos. 2-3, pp. 177-192, 2010.
-
(2010)
Ad Hoc Sens. Wireless Netw.
, vol.10
, Issue.2-3
, pp. 177-192
-
-
Biswas, S.1
-
17
-
-
84942636228
-
Software defined networking-based vehicular Adhoc network with fog computing
-
May
-
N. B. Truong, G. M. Lee, and Y. Ghamri-Doudane, "Software defined networking-based vehicular Adhoc network with fog computing," in Proc. IFIP/IEEE Int. Symp. IM May 2015, pp. 1202-1207.
-
(2015)
Proc. IFIP/IEEE Int. Symp. Im
, pp. 1202-1207
-
-
Truong, N.B.1
Lee, G.M.2
Ghamri-Doudane, Y.3
-
18
-
-
84987650945
-
Pseudonymous authentication for secure V2I services in cloud-based vehicular networks
-
Y. Park, C. Sur, and K.-H. Rhee, "Pseudonymous authentication for secure V2I services in cloud-based vehicular networks," J. Ambient Intell. Hum. Comput., vol. 7, no. 5, pp. 661-671, 2015.
-
(2015)
J. Ambient Intell. Hum. Comput.
, vol.7
, Issue.5
, pp. 661-671
-
-
Park, Y.1
Sur, C.2
Rhee, K.-H.3
-
19
-
-
84962514275
-
A pseudonym management system to achieve anonymity in vehicular ad hoc networks
-
Jan.
-
H. Artail and N. Abbani, "A pseudonym management system to achieve anonymity in vehicular ad hoc networks," IEEE Trans. Depend. Sec. Comput., vol. 13, no. 1, pp. 106-119, Jan. 2016.
-
(2016)
IEEE Trans. Depend. Sec. Comput.
, vol.13
, Issue.1
, pp. 106-119
-
-
Artail, H.1
Abbani, N.2
-
20
-
-
85010056879
-
Focusing on mobile users at the edge of Internet of things using fog computing
-
R. Suryawanshi et al., "Focusing on mobile users at the edge of Internet of things using fog computing," Int. J. Sci. Eng. Technol. Res., vol. 4, no. 17, pp. 3225-3231, 2015.
-
(2015)
Int. J. Sci. Eng. Technol. Res.
, vol.4
, Issue.17
, pp. 3225-3231
-
-
Suryawanshi, R.1
-
21
-
-
77149139158
-
Limits of predictability in human mobility
-
C. Song et al., "Limits of predictability in human mobility," Science, vol. 327, no. 5968, pp. 1018-1021, 2010.
-
(2010)
Science
, vol.327
, Issue.5968
, pp. 1018-1021
-
-
Song, C.1
-
22
-
-
58149135996
-
Pseudonym-on-demand: A new pseudonym refill strategy for vehicular communications
-
Sep.
-
Z. Ma, F. Kargl, and M. Weber, "Pseudonym-on-demand: A new pseudonym refill strategy for vehicular communications," in Proc. IEEE Veh. Technol. Conf., Sep. 2008, pp. 1-5.
-
(2008)
Proc. IEEE Veh. Technol. Conf.
, pp. 1-5
-
-
Ma, Z.1
Kargl, F.2
Weber, M.3
-
23
-
-
84925535304
-
Privacy-aware access control for message exchange in vehicular ad hoc networks
-
S. Karumanchi, A. Squicciarini, and D. Lin, "Privacy-aware access control for message exchange in vehicular ad hoc networks," Telecommun. Syst., vol. 58, no. 4, pp. 349-361, 2015.
-
(2015)
Telecommun. Syst.
, vol.58
, Issue.4
, pp. 349-361
-
-
Karumanchi, S.1
Squicciarini, A.2
Lin, D.3
-
24
-
-
51349156734
-
ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications
-
Apr.
-
R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, "ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications," in Proc. IEEE INFOCOM, Apr. 2008, pp. 1229-1237.
-
(2008)
Proc. IEEE INFOCOM
, pp. 1229-1237
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Ho, P.-H.4
Shen, X.5
|