Dynamic attribute based vehicle authentication
暂无分享,去创建一个
[1] Robert A. MacLachlan,et al. Tracking of Moving Objects from a Moving Vehicle Using a Scanning Laser Rangefinder , 2006, 2006 IEEE Intelligent Transportation Systems Conference.
[2] Ruhul Amin,et al. A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks , 2016, Ad Hoc Networks.
[3] Je Hong Park,et al. Authenticated Key Exchange Secure under the Computational Diffie-Hellman Assumption , 2008, IACR Cryptol. ePrint Arch..
[4] Naveen K. Chilamkurti,et al. A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks , 2015, Inf. Sci..
[5] Keith Redmill,et al. Automated parking surveys from a LIDAR equipped vehicle , 2014 .
[6] Shigang Li,et al. Calibration of Nonoverlapping In-Vehicle Cameras With Laser Pointers , 2015, IEEE Transactions on Intelligent Transportation Systems.
[7] Hans-Werner Gellersen,et al. Usability classification for spontaneous device association , 2011, Personal and Ubiquitous Computing.
[8] Yutaka Matsushita,et al. An inter-vehicle networking method using laser media , 1994, Proceedings of IEEE Vehicular Technology Conference (VTC).
[9] N. Epley,et al. The mind in the machine: Anthropomorphism increases trust in an autonomous vehicle , 2014 .
[10] Jar-Ferr Yang,et al. Enhancement authentication protocol using zero‐knowledge proofs and chaotic maps , 2017, Int. J. Commun. Syst..
[11] Maxim Raya,et al. Securing vehicular ad hoc networks , 2007, J. Comput. Secur..
[12] Jean-Charles Noyer,et al. A PHD approach for multiple vehicle tracking based on a polar detection method in laser range data , 2013, 2013 IEEE International Systems Conference (SysCon).
[13] Berkant Ustaoglu,et al. Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS , 2008, Des. Codes Cryptogr..
[14] John Swanson,et al. Light-Rail Transit Systems , 2010, IEEE Vehicular Technology Magazine.
[15] Lawrence Ulrich. Top ten tech cars , 2014, IEEE Spectrum.
[16] Michael Thuy,et al. Non-linear, shape independent object tracking based on 2D lidar data , 2009, 2009 IEEE Intelligent Vehicles Symposium.
[17] Oliver W. W. Yang,et al. Vehicular telematics over heterogeneous wireless networks: A survey , 2010, Comput. Commun..
[18] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[19] Fabian de Ponte Müller,et al. Characterization of a Laser Scanner Sensor for the Use as a Reference System in Vehicular Relative Positioning , 2013, Nets4Cars/Nets4Trains.
[20] Lawrence Ulrich,et al. Whiter brights with lasers , 2013, IEEE Spectrum.
[21] Tomotaka Wada,et al. Novel vehicle information acquisition method using vehicle code for automotive infrared laser radar , 2014, 2014 Australasian Telecommunication Networks and Applications Conference (ATNAC).
[22] John B. Kenney,et al. Dedicated Short-Range Communications (DSRC) Standards in the United States , 2011, Proceedings of the IEEE.
[23] K David,et al. 2020 Vision , 1998, IEEE Vehicular Technology Magazine.
[24] Shwetak N. Patel,et al. Experimental Security Analysis of a Modern Automobile , 2010, 2010 IEEE Symposium on Security and Privacy.
[25] Arun Kumar,et al. Article in Press Pervasive and Mobile Computing ( ) – Pervasive and Mobile Computing a Comparative Study of Secure Device Pairing Methods , 2022 .
[26] A. W. Roscoe,et al. Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey , 2011, J. Comput. Secur..
[27] Tim Kindberg,et al. Secure Spontaneous Device Association , 2003, UbiComp.
[29] Matthias Ringwald,et al. Spontaneous Interaction with Everyday Devices Using a PDA , 2002 .
[30] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[31] Hong Liu,et al. Modeling and characterization of GPS spoofing , 2013, 2013 IEEE International Conference on Technologies for Homeland Security (HST).
[32] Ueli Maurer,et al. The Relationship Between Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms , 1999, SIAM J. Comput..
[33] A Pizzinat,et al. Radio-Over-Fiber Architectures , 2010, IEEE Vehicular Technology Magazine.
[34] René Mayrhofer,et al. A Human-Verifiable Authentication Protocol Using Visible Laser Light , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[35] Hannes Hartenstein,et al. A tutorial survey on vehicular ad hoc networks , 2008, IEEE Communications Magazine.
[36] Maxim Raya,et al. The security of VANETs , 2005, VANET '05.
[37] Azzedine Boukerche,et al. Preventing a DoS threat in vehicular ad-hoc networks using adaptive group beaconing , 2012, Q2SWinet '12.
[38] Michael Segal,et al. Vehicle authentication via monolithically certified public key and attributes , 2015, Wirel. Networks.
[39] Kristin E. Lauter,et al. Stronger Security of Authenticated Key Exchange , 2006, ProvSec.
[40] Panagiotis Papadimitratos,et al. Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.
[41] Hugo Krawczyk,et al. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.
[42] Maria Kihl,et al. Inter-vehicle communication systems: a survey , 2008, IEEE Communications Surveys & Tutorials.
[43] Hugo Krawczyk,et al. SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols , 2003, CRYPTO.
[44] Suzanne Sloan,et al. An Approach to Communications Security for a Communications Data Delivery System for V2V/V2I Safety: Technical Description and Identification of Policy and Institutional Issues , 2011 .
[45] Michael K. Reiter,et al. Seeing-is-believing: using camera phones for human-verifiable authentication , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[46] Jean-Claude Bajard,et al. A New Security Model for Authenticated Key Agreement , 2010, SCN.
[47] Michel Barbeau,et al. Detecting Impersonation Attacks in Future Wireless and Mobile Networks , 2005, MADNES.
[48] Michael Segal,et al. Dynamic attribute based vehicle authentication , 2014, 2014 IEEE 13th International Symposium on Network Computing and Applications.
[49] Roland H. C. Yap,et al. Extending BAN Logic for Reasoning with Modern PKI-Based Protocols , 2008, 2008 IFIP International Conference on Network and Parallel Computing.
[50] Michael Beigl. Point & Click - Interaction in Smart Environments , 1999, HUC.