Proactive Certificate Distribution for PKI in VANET
暂无分享,去创建一个
Khalil El-Khatib | Joshua Harrington | Horacio A. B. F. de Oliveira | Jesse Lacroix | Felipe Leite Lobo | Joshua Harrington | Horácio Oliveira | K. El-Khatib | Jesse Lacroix | F. Lobo
[1] H. T. Mouftah,et al. Effective public key infrastructure for vehicle-to-grid network , 2014, DIVANet '14.
[2] Sudip Misra,et al. Guide to Wireless Ad Hoc Networks , 2009, Computer Communications and Networks.
[3] Khalil El-Khatib,et al. Privacy representation in VANET , 2013, DIVANet '13.
[4] Jie Wu,et al. Mobility Management in MANETs: Exploit the Positive Impacts of Mobility , 2009, Guide to Wireless Ad Hoc Networks.
[5] Hyun-Chul Kim,et al. A Design of One-Time Password Mechanism Using Public Key Infrastructure , 2008, 2008 Fourth International Conference on Networked Computing and Advanced Information Management.
[6] E. Munivel,et al. Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks , 2010, 2010 International Conference on Wireless Communication and Sensor Computing (ICWCSC).
[7] Sherali Zeadally,et al. A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks , 2008, Comput. Commun..
[8] Maxim Raya,et al. Efficient secure aggregation in VANETs , 2006, VANET '06.
[9] Ali Aydın Selçuk,et al. Public Key Infrastructure , 2011, Encyclopedia of Cryptography and Security.
[10] LuRongxing,et al. Complementing public key infrastructure to secure vehicular ad hoc networks , 2010 .
[11] Azzedine Boukerche,et al. Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..
[12] Robert Charette. Every move you make , 2009, IEEE Spectrum.
[13] Depeng Jin,et al. Vehicular Fog Computing: A Viewpoint of Vehicles as the Infrastructures , 2016, IEEE Transactions on Vehicular Technology.
[14] Maged Hamada Ibrahim,et al. Octopus: An Edge-fog Mutual Authentication Scheme , 2016, Int. J. Netw. Secur..
[15] Karim Emara,et al. Vehicle tracking using vehicular network beacons , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).
[16] Jitendra Bhatia,et al. REVIEW ON VARIOUS SECURITY THREATS & SOLUTIONS AND NETWORK CODING BASED SECURITY APPROACH FOR VANET , 2013 .
[17] Azzedine Boukerche,et al. A security management scheme using a novel computational reputation model for wireless and mobile ad hoc networks , 2008, PE-WASUN '08.
[18] Maxim Raya,et al. The security of vehicular ad hoc networks , 2005, SASN '05.
[19] Rajkumar Buyya,et al. Feasibility of Fog Computing , 2017, Scalable Computing and Communications.
[20] K. V. Prema,et al. Comparison of Certificate Policies for Merging Public Key Infrastructures during Merger and Acquisition of Companies , 2012, ArXiv.
[21] Paolo Bellavista,et al. Dissemination and Harvesting of Urban Data Using Vehicular Sensing Platforms , 2009, IEEE Transactions on Vehicular Technology.
[22] Injoo Kim,et al. Security issues in vehicular networks , 2013, The International Conference on Information Networking 2013 (ICOIN).
[23] Jalel Ben-Othman,et al. Solution of detecting jamming attacks in vehicle ad hoc networks , 2013, MSWiM.
[24] Azzedine Boukerche,et al. Securing vehicular ad hoc networks with mean field game theory , 2013, DIVANet '13.
[25] Azzedine Boukerche,et al. A Secure Cooperative Approach for Nonline-of-Sight Location Verification in VANET , 2012, IEEE Transactions on Vehicular Technology.
[26] Hyoung-Kee Choi,et al. A practical security framework for a VANET-based entertainment service , 2009, PM2HW2N '09.
[27] Khalil El-Khatib,et al. Paving the way for Intelligent Transport Systems (ITS): Privacy Implications of Vehicle Infotainment and Telematics Systems , 2016, DIVANet@MSWiM.
[28] Azzedine Boukerche,et al. Trust based security enhancements for vehicular ad hocnetworks , 2014, DIVANet '14.
[29] Xiaodong Lin,et al. Complementing public key infrastructure to secure vehicular ad hoc networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.
[30] Hussein Zedan,et al. A comprehensive survey on vehicular Ad Hoc network , 2014, J. Netw. Comput. Appl..
[31] Behrouz A. Forouzan,et al. Cryptography and network security , 1998 .
[32] Andreas Pitsillides,et al. Security evaluation methodology for intrusion recovery protocols in wireless sensor networks , 2012, MSWiM '12.