Adaptive security provisioning for vehicular safety applications
暂无分享,去创建一个
[1] Waqas Aman,et al. Managing security trade-offs in the Internet of Things using adaptive security , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).
[2] Fredrik Tufvesson,et al. Path Loss Modeling for Vehicle-to-Vehicle Communications , 2011, IEEE Transactions on Vehicular Technology.
[3] Frank Kargl,et al. The impact of security on cooperative awareness in VANET , 2013, 2013 IEEE Vehicular Networking Conference.
[4] Jamil Y. Khan,et al. Distributed spatial reuse distance control for basic safety messages in SDMA-based VANETs , 2015, Veh. Commun..
[5] Elyes Ben Hamida,et al. On the Interrelation of Security, QoS, and Safety in Cooperative ITS , 2017, IEEE Transactions on Intelligent Transportation Systems.
[6] Elyes Ben Hamida,et al. Measuring safety awareness in cooperative ITS applications , 2016, 2016 IEEE Wireless Communications and Networking Conference.
[7] Jelena V. Misic,et al. Relevance-based verification of VANET safety messages , 2012, 2012 IEEE International Conference on Communications (ICC).
[8] Elyes Ben Hamida,et al. Towards extended safety in connected vehicles , 2013, 16th International IEEE Conference on Intelligent Transportation Systems (ITSC 2013).
[9] Jelena V. Misic,et al. Location-based anonymous authentication for vehicular communications , 2011, 2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications.
[10] Naixue Xiong,et al. Scheduling security-critical multimedia applications in heterogeneous networks , 2011, Comput. Commun..
[11] Jamil Y. Khan,et al. Joint space-division multiple access and adaptive rate control for basic safety messages in VANETs , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).
[12] Xuemin Shen,et al. BAT: A robust signature scheme for vehicular networks using Binary Authentication Tree , 2009, IEEE Transactions on Wireless Communications.
[13] Mohammad S. Obaidat,et al. Vehicular Security Through Reputation and Plausibility Checks , 2014, IEEE Systems Journal.
[14] Elyes Ben Hamida,et al. Investigating the impact of human activity on the performance of wireless networks — An experimental approach , 2010, 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).
[15] Mario Gerla,et al. Vehicular cloud networking: architecture and design principles , 2014, IEEE Communications Magazine.
[16] Chunxiao Chigan,et al. On Resource-Aware Message Verification in VANETs , 2010, 2010 IEEE International Conference on Communications.
[17] Antonio Cicchetti,et al. Design of Adaptive Security Mechanisms for Real-Time Embedded Systems , 2012, ESSoS.
[18] Jamil Y. Khan,et al. A geocasting technique in an IEEE802.11p based vehicular ad hoc network for road traffic management , 2011, 2011 Australasian Telecommunication Networks and Applications Conference (ATNAC).
[19] S. P. Lloyd,et al. Least squares quantization in PCM , 1982, IEEE Trans. Inf. Theory.
[20] Elyes Ben Hamida,et al. Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice , 2016, Sensors.
[21] Yue Zhao,et al. Yinyang K-Means: A Drop-In Replacement of the Classic K-Means with Consistent Speedup , 2015, ICML.
[22] Mary Inaba,et al. Applications of weighted Voronoi diagrams and randomization to variance-based k-clustering: (extended abstract) , 1994, SCG '94.
[23] Elyes Ben Hamida,et al. Security of Cooperative Intelligent Transport Systems: Standards, Threats Analysis and Cryptographic Countermeasures , 2015 .
[24] Steven Gordon,et al. Selecting basic safety messages to verify in VANETs using zone priority , 2014, The 20th Asia-Pacific Conference on Communication (APCC2014).
[25] Elyes Ben Hamida,et al. Performance impact of security on cooperative awareness in dense urban vehicular networks , 2015, 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[26] Pin-Han Ho,et al. An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[27] Miodrag Potkonjak,et al. On communication security in wireless ad-hoc sensor networks , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[28] Elyes Ben Hamida,et al. Adaptive security mechanisms for safety applications in Internet of Vehicles , 2016, 2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[29] Mate Boban,et al. Experimental study on the impact of vehicular obstructions in VANETs , 2010, 2010 IEEE Vehicular Networking Conference.