Wireless Location Privacy Protection in Vehicular Ad-Hoc Networks
暂无分享,去创建一个
[1] Adrian Perrig,et al. The BiBa one-time signature and broadcast authentication protocol , 2001, CCS '01.
[2] Matthias Gerlach,et al. Privacy in VANETs using Changing Pseudonyms - Ideal and Real , 2007, 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring.
[3] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[4] George Danezis,et al. Towards an Information Theoretic Metric for Anonymity , 2002, Privacy Enhancing Technologies.
[5] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[6] Itamar Elhanany,et al. A Novel Signal-Scheduling Algorithm With Quality-of-Service Provisioning for an Isolated Intersection , 2008, IEEE Transactions on Intelligent Transportation Systems.
[7] Marco Gruteser,et al. USENIX Association , 1992 .
[8] Kaoru Sezaki,et al. Enhancing wireless location privacy using silent period , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[9] Maxim Raya,et al. Mix-Zones for Location Privacy in Vehicular Networks , 2007 .
[10] Brian Wolshon,et al. Analysis of intersection delay under real-time adaptive signal control , 1999 .
[11] Ozan K. Tonguz,et al. Routing in Sparse Vehicular Ad Hoc Wireless Networks , 2007, IEEE Journal on Selected Areas in Communications.
[12] Nigel Davies,et al. Preserving Privacy in Environments with Location-Based Applications , 2003, IEEE Pervasive Comput..
[13] Xiaoyan Hong,et al. Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless Networks , 2007, 2007 IEEE Intelligence and Security Informatics.
[14] Sheldon M. Ross. Introduction to Probability Models. , 1995 .
[15] Ehssan Sakhaee,et al. A Stable Routing Protocol to Support ITS Services in VANET Networks , 2007, IEEE Transactions on Vehicular Technology.
[16] Rui L. Aguiar,et al. Support of Anonymity in VANETs - Putting Pseudonymity into Practice , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[17] Ling Liu,et al. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.
[18] Mustafa K. Mehmet Ali,et al. A Performance Modeling of Vehicular Ad Hoc Networks (VANETs) , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[19] Stephen E. Deering,et al. ICMP Router Discovery Messages , 1991, RFC.
[20] Levente Buttyán,et al. On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs , 2007, ESAS.
[21] Radha Poovendran,et al. AMOEBA: Robust Location Privacy Scheme for VANET , 2007, IEEE Journal on Selected Areas in Communications.
[22] Hong K. Lo,et al. A reliability framework for traffic signal control , 2006, IEEE Transactions on Intelligent Transportation Systems.
[23] 黒田 孝次,et al. Highway Capacity Manual改訂の動向--テイラ-教授の講演より , 1984 .
[24] Ran Canetti,et al. Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction , 2005, RFC.
[25] Sheldon M. Ross,et al. Introduction to Probability Models (4th ed.). , 1990 .
[26] Tim Leinmüller,et al. Impact of Pseudonym Changes on Geographic Routing in VANETs , 2006, ESAS.