Vehicle Witnesses as a Service: Leveraging Vehicles as Witnesses on the Road in VANET Clouds
暂无分享,去创建一个
Donghyun Kim | Sangjin Kim | Junggab Son | Heekuck Oh | Rasheed Hussain | Fizza Abbas | Junggab Son | Fizza Abbas | H. Oh | Sangjin Kim | Donghyun Kim | Rasheed Hussain
[1] Zhendong Ma,et al. Privacy in inter-vehicular networks: Why simple pseudonym change is not enough , 2010, 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS).
[2] David Antolino Rivas,et al. Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation , 2011, J. Netw. Comput. Appl..
[3] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[4] Giovanni Pau,et al. Pics-on-wheels: Photo surveillance in the vehicular cloud , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).
[5] Frank Stajano,et al. Mix zones: user privacy in location-aware services , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[6] Michael Weber,et al. Pseudonym-On-Demand: A New Pseudonym Refill Strategy for Vehicular Communications , 2008, 2008 IEEE 68th Vehicular Technology Conference.
[7] Stephan Olariu,et al. Towards autonomous vehicular clouds , 2011, EAI Endorsed Trans. Mob. Commun. Appl..
[8] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[9] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[10] Yi Wang,et al. On full-view coverage in camera sensor networks , 2011, 2011 Proceedings IEEE INFOCOM.
[11] Xinbing Wang,et al. Achieving Full View Coverage with Randomly-Deployed Heterogeneous Camera Sensors , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.
[12] Junggab Son,et al. TIaaS: Secure Cloud-assisted Traffic Information Dissemination in Vehicular Ad Hoc Networks , 2013, 2013 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing.
[13] Heekuck Oh,et al. Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET , 2009, WISA.
[14] Souhwan Jung,et al. Mutual Identification and Key Exchange Scheme in Secure VANETs Based on Group Signature , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.
[15] Rui L. Aguiar,et al. Support of Anonymity in VANETs - Putting Pseudonymity into Practice , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[16] Reinhard German,et al. Strong and affordable location privacy in VANETs: Identity diffusion using time-slots and swapping , 2010, 2010 IEEE Vehicular Networking Conference.
[17] Sangjin Kim,et al. Rethinking Vehicular Communications: Merging VANET with cloud computing , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.
[18] Pin-Han Ho,et al. An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[19] Maxim Raya,et al. Securing vehicular ad hoc networks , 2007, J. Comput. Secur..