Security and Privacy of Intelligent VANETs

[1]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[2]  Elmar Schoch,et al.  Communication patterns in VANETs , 2008, IEEE Communications Magazine.

[3]  Jing Zhao,et al.  VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks , 2008, IEEE Trans. Veh. Technol..

[4]  Andreas Meier,et al.  Design of 5.9 ghz dsrc-based vehicular safety communication , 2006, IEEE Wireless Communications.

[5]  Y. Koucheryavy,et al.  State of the Art and Research Challenges for VANETs , 2008, 2008 5th IEEE Consumer Communications and Networking Conference.

[6]  Liviu Iftode,et al.  A Comparative Study of Data Dissemination Models for VANETs , 2006 .

[7]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[8]  Jessica Staddon,et al.  Detecting and correcting malicious data in VANETs , 2004, VANET '04.

[9]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[10]  Panagiotis Papadimitratos,et al.  Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.

[11]  Yueh-Min Huang,et al.  A novel secure communication scheme in vehicular ad hoc networks , 2008, Comput. Commun..

[12]  Joonsang Baek,et al.  Formal Proofs for the Security of Signcryption , 2002, Journal of Cryptology.

[13]  Gongjun Yan,et al.  Providing VANET security through active position detection , 2008, Comput. Commun..

[14]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[15]  Pin-Han Ho,et al.  Security in vehicular ad hoc networks , 2008, IEEE Commun. Mag..

[16]  Eric Maiwald Fundamentals of network security , 2003 .

[17]  Maxim Raya,et al.  Securing vehicular ad hoc networks , 2007, J. Comput. Secur..

[18]  Srdjan Capkun,et al.  The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.

[19]  Sumair Ur Rahman,et al.  Secure crash reporting in vehicular Ad hoc networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[20]  G. Arfken Mathematical Methods for Physicists , 1967 .

[21]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[22]  R. Guy,et al.  The Book of Numbers , 2019, The Crimean Karaim Bible.

[23]  Adrian Perrig,et al.  Challenges in Securing Vehicular Networks , 2005 .

[24]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[25]  R. Want,et al.  System challenges for ubiquitous & pervasive computing , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..

[26]  Tanja Lange,et al.  Pairing-Based Cryptography , 2005, Handbook of Elliptic and Hyperelliptic Curve Cryptography.

[27]  Azzedine Boukerche,et al.  Vehicular Ad Hoc Networks: A New Challenge for Localization-Based Systems , 2008, Comput. Commun..

[28]  William Stallings,et al.  THE ADVANCED ENCRYPTION STANDARD , 2002, Cryptologia.

[29]  Arati Baliga,et al.  An identity-based security framework For VANETs , 2006, VANET '06.

[30]  Joonsang Baek,et al.  A Survey of Identity-Based Cryptography , 2004 .

[31]  Hovav Shacham,et al.  Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.

[32]  Anupam Joshi,et al.  StreetSmart Traffic: Discovering and Disseminating Automobile Congestion Using VANET's , 2007, 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring.

[33]  Emmanouil Magkos,et al.  Strengthening Privacy Protection in VANETs , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[34]  P.H.J. Chong,et al.  A survey of clustering schemes for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[35]  Liuqing Yang,et al.  Driving into Intelligent Spaces with Pervasive Communications , 2007, IEEE Intelligent Systems.

[36]  Martin Mauve,et al.  A survey on real-world implementations of mobile ad-hoc networks , 2007, Ad Hoc Networks.

[37]  Panagiotis Papadimitratos,et al.  SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.

[38]  Pin-Han Ho,et al.  GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.

[39]  Chan Yeob Yeun,et al.  Security for emerging ubiquitous networks , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[40]  Anupam Joshi,et al.  Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory , 2009, 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware.

[41]  Stephan Eichler,et al.  Performance Evaluation of the IEEE 802.11p WAVE Communication Standard , 2007, 2007 IEEE 66th Vehicular Technology Conference.

[42]  Yuguang Fang,et al.  An ID-based Framework Achieving Privacy and Non-Repudiation in Vehicular Ad Hoc Networks , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[43]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[44]  Christian Kray,et al.  Evaluating Pervasive and Ubiquitous Systems , 2008, IEEE Pervasive Computing.