A Game Theory-Based Analysis of Data Privacy in Vehicular Sensor Networks
暂无分享,去创建一个
Weidong Yang | Limin Sun | Hong Li | Yunhua He | Limin Sun | Hong Li | Yunhua He | Weidong Yang
[1] Kaoru Sezaki,et al. Towards Modeling Wireless Location Privacy , 2005, Privacy Enhancing Technologies.
[2] David K. Y. Yau,et al. Privacy vulnerability of published anonymous mobility traces , 2010, MobiCom.
[3] Mudhakar Srivatsa,et al. The fable of the bees: incentivizing robust revocation decision making in ad hoc networks , 2009, CCS.
[4] Pin-Han Ho,et al. An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[5] Carmela Troncoso,et al. Protecting location privacy: optimal strategy against localization attacks , 2012, CCS.
[6] H. Nissenbaum. Privacy as contextual integrity , 2004 .
[7] Xiaohui Liang,et al. Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs , 2012, IEEE Transactions on Vehicular Technology.
[8] Pin-Han Ho,et al. An Efficient Message Authentication Scheme for Vehicular Communications , 2008, IEEE Transactions on Vehicular Technology.
[9] Siu-Ming Yiu,et al. VSPN: VANET-Based Secure and Privacy-Preserving Navigation , 2014, IEEE Transactions on Computers.
[10] T. Başar,et al. An Intrusion Detection Game with Limited Observations , 2005 .
[11] Marco Gruteser,et al. USENIX Association , 1992 .
[12] M. A. Razzaque,et al. Security and Privacy in Vehicular Ad-Hoc Networks: Survey and the Road Ahead , 2013, Wireless Networks and Security.
[13] T. Basar,et al. A game theoretic analysis of intrusion detection in access control systems , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).
[14] Xiaodong Lin,et al. An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications , 2010, IEEE Transactions on Vehicular Technology.
[15] Dijiang Huang,et al. PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs , 2011, IEEE Transactions on Intelligent Transportation Systems.
[16] Tansu Alpcan,et al. Security games for vehicular networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[17] Vitaly Shmatikov,et al. Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[18] David C. Parkes,et al. On non-cooperative location privacy: a game-theoretic analysis , 2009, CCS.
[19] Maxim Raya,et al. Revocation games in ephemeral networks , 2008, CCS.
[20] Pin-Han Ho,et al. GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.
[21] John C. Harsanyi,et al. Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..
[22] Pin-Han Ho,et al. Security in vehicular ad hoc networks , 2008, IEEE Commun. Mag..
[23] Yücel Saygin,et al. Towards trajectory anonymization: a generalization-based approach , 2008, SPRINGL '08.
[24] César A. Hidalgo,et al. Unique in the Crowd: The privacy bounds of human mobility , 2013, Scientific Reports.
[25] Hassan Artail,et al. A Framework for Secure and Efficient Data Acquisition in Vehicular Ad Hoc Networks , 2013, IEEE Transactions on Vehicular Technology.
[26] Nicolas Christin,et al. Secure or insure?: a game-theoretic analysis of information security games , 2008, WWW.
[27] Hui Xiong,et al. Achieving Guaranteed Anonymity in GPS Traces via Uncertainty-Aware Path Cloaking , 2010, IEEE Transactions on Mobile Computing.
[28] Huang Lu,et al. A novel ID-based authentication framework with adaptive privacy preservation for VANETs , 2012, 2012 Computing, Communications and Applications Conference.