Securing data dissemination in vehicular ad hoc networks
暂无分享,去创建一个
[1] Yu Cheng,et al. A Distributed Key Management Framework with Cooperative Message Authentication in VANETs , 2011, IEEE Journal on Selected Areas in Communications.
[2] Iman Almomani. Security Solutions for Wireless Mobile Ad hoc Networks: (WMANETs) , 2011, AdHocNets 2011.
[3] S. Yousefi,et al. Vehicular Ad Hoc Networks (VANETs): Challenges and Perspectives , 2006, 2006 6th International Conference on ITS Telecommunications.
[4] Aihuang Guo,et al. Evaluation of MANET Routing Protocols in Realistic Environments , 2013 .
[5] Andrea Westerinen,et al. Terminology for Policy-Based Management , 2001, RFC.
[6] J. V. D. Merwe,et al. Self-Organized Public Key Management for Mobile Ad Hoc Networks , 2002 .
[7] Flaminio Borgonovo,et al. ADHOC MAC: New MAC Architecture for Ad Hoc Networks Providing Efficient and Reliable Point-to-Point and Broadcast Services , 2004, Wirel. Networks.
[8] M. Malowidzki. Network Simulators: a Developer's Perspective , .
[9] Stephan Eichler,et al. Performance Evaluation of the IEEE 802.11p WAVE Communication Standard , 2007, 2007 IEEE 66th Vehicular Technology Conference.
[10] Yen-Fu Liu,et al. Secure Communication Scheme of VANET with Privacy Preserving , 2011, 2011 IEEE 17th International Conference on Parallel and Distributed Systems.
[11] D. Curren,et al. A Survey of Simulation in Sensor Networks , 2005 .
[12] Stephen Smalley,et al. Integrating Flexible Support for Security Policies into the Linux Operating System , 2001, USENIX Annual Technical Conference, FREENIX Track.
[13] Dan. Collusion-Secure Fingerprinting for Digital Data , 2002 .
[14] Juan E. Tapiador,et al. Cooperative Security in Peer-to-Peer and Mobile Ad Hoc Networks , 2009 .
[15] Ekata Mehul,et al. Security in Mobile Ad Hoc Networks , 2009 .
[16] Hussein Zedan,et al. Security Solution for Mobile Ad Hoc Network of Networks (MANoN) , 2009, 2009 Fifth International Conference on Networking and Services.
[17] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[18] Roberto Baldessari. C2C-C Consortium Requirements for NEMO Route Optimization , 2007 .
[19] Fei Xing,et al. Understanding Dynamic Denial of Service Attacks in Mobile Ad Hoc Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[20] Tim Leinmüller,et al. Trust Issues for Vehicular Ad Hoc Networks , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.
[21] Mihaela Cardei,et al. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .
[22] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[23] Djamel Djenouri,et al. A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.
[24] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[25] Ray Hunt,et al. PKI and digital certification infrastructure , 2001, Proceedings. Ninth IEEE International Conference on Networks, ICON 2001..
[26] Xin Wang,et al. A Robust Detection of the Sybil Attack in Urban VANETs , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems Workshops.
[27] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[28] Jack Brassil. Hiding Information in Document Images , 2007 .
[29] Yvo Desmedt,et al. Threshold cryptography , 1994, Eur. Trans. Telecommun..
[30] Hussein Zedan,et al. Security Management for Mobile Ad Hoc Network of Networks (MANoN) , 2009, Int. J. Mob. Comput. Multim. Commun..
[31] Dijiang Huang,et al. SeGCom: Secure Group Communication in VANETs , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.
[32] Richard Mollin. An introduction to cryptography , 2001, CRC Press series on discrete mathematics and its applications.
[33] Sherali Zeadally,et al. Security in vehicular ad hoc networks , 2013 .
[34] Ana I. González-Tablas,et al. Overview of security issues in Vehicular Ad-hoc Networks , 2011 .
[35] Mike Burmester,et al. Short c-Secure Fingerprinting Codes , 2003, ISC.
[36] Teerawat Issariyakul,et al. Introduction to Network Simulator NS2 , 2008 .
[37] Changhui Hu,et al. Efficient HMAC-based secure communication for VANETs , 2012, Comput. Networks.
[38] Iman Almomani. END-TO-END SECURITY SOLUTION FOR WIRELESS MOBILE AD HOC NETWORK ( WMANET ) , 2007 .
[39] S. Katragadda,et al. A decentralized location-based channel access protocol for inter-vehicle communication , 2003, The 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003-Spring..
[40] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[41] Ravi S. Sandhu,et al. How to do discretionary access control using roles , 1998, RBAC '98.
[42] Xiaohui Liang,et al. STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs , 2011, 2011 Proceedings IEEE INFOCOM.
[43] Jorge Lobo,et al. Policy Technologies for Self-Managing Systems , 2008 .
[44] Stephen T. Kent,et al. Securing the Nimrod routing architecture , 1997, Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security.
[45] Mohan S. Kankanhalli,et al. Watermarking of Electronic Text Documents , 2002, Electron. Commer. Res..
[46] Maxim Raya,et al. Efficient secure aggregation in VANETs , 2006, VANET '06.
[47] Arobinda Gupta,et al. Detecting misbehaviors in VANET with integrated root-cause analysis , 2010, Ad Hoc Networks.
[48] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[49] Shon Harris,et al. CISSP All-in-One Exam Guide , 2001 .
[50] Tariq A. A. Alsboui,et al. Simulation Issues in Wireless Sensor Networks : A Survey , 2012 .
[51] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[52] Xiaoyan Hong,et al. Situation-aware trust architecture for vehicular networks , 2010, IEEE Communications Magazine.
[53] Brian Haberman,et al. Key Challenges of Military Tactical Networking and the Elusive Promise of MANET Technology , 2006, IEEE Communications Magazine.
[54] Xiaodong Lin,et al. Complementing public key infrastructure to secure vehicular ad hoc networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.
[55] Ivan Stojmenovic,et al. Data-centric Misbehavior Detection in VANETs , 2011, ArXiv.
[56] Hsiao-Hwa Chen,et al. DESCV—A Secure Wireless Communication Scheme for Vehicle ad hoc Networking , 2009, Mob. Networks Appl..
[57] Liviu Iftode,et al. A Comparative Study of Data Dissemination Models for VANETs , 2006, 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems - Workshops.
[58] L. Wolf,et al. Mobility management for vehicular ad hoc networks , 2005, 2005 IEEE 61st Vehicular Technology Conference.
[59] Erik G. Ström,et al. How Severe Is the Hidden Terminal Problem in VANETs When Using CSMA and STDMA? , 2011, 2011 IEEE Vehicular Technology Conference (VTC Fall).
[60] Singh Sumitkumar,et al. Enhanced Security for Information Flow in VANET using Signcryption and Trust level , 2011 .
[61] Panagiotis Papadimitratos,et al. SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.
[62] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[63] Xiaohui Liang,et al. PPC: Privacy-Preserving Chatting in Vehicular Peer-to-Peer Networks , 2010, 2010 IEEE 72nd Vehicular Technology Conference - Fall.
[64] Simon S. Lam,et al. Authorization in Distributed Systems: A New Approach , 1993 .
[65] Rosslin John Robles,et al. Symmetric-Key Encryption for Wireless Internet SCADA , 2009, FGIT-SecTech.
[66] Wu Hsin-Te,et al. A Novel RSU-Based Message Authentication Scheme for VANET , 2010, 2010 Fifth International Conference on Systems and Networks Communications.