Authentication vs. Privacy within Vehicular Ad Hoc Networks
暂无分享,去创建一个
[1] Fan Bai,et al. Towards Characterising and Classifying Communication–based Automotive Applications from a Wireless Networking Perspective , 2012 .
[2] Adrian Perrig,et al. Flexible, extensible, and efficient VANET authentication , 2009, Journal of Communications and Networks.
[3] Dawn Song,et al. The TESLA Broadcast Authentication Protocol , 2002 .
[4] Maxim Raya,et al. The security of vehicular ad hoc networks , 2005, SASN '05.
[5] Chak-Kuen Wong,et al. A conference key distribution system , 1982, IEEE Trans. Inf. Theory.
[6] John B. Shoven,et al. I , Edinburgh Medical and Surgical Journal.
[7] Panagiotis Papadimitratos,et al. Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.
[8] Nai-Wei Lo,et al. A Reputation System for Traffic Safety Event on Vehicular Ad Hoc Networks , 2009, EURASIP J. Wirel. Commun. Netw..
[9] Panagiotis Papadimitratos,et al. Secure vehicular communication systems: implementation, performance, and research challenges , 2008, IEEE Communications Magazine.
[10] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[11] Yacine Challal,et al. Hi-KD : Hash-based hierarchical Key Distribution for Group Communication , 2005 .
[12] Adrian Perrig,et al. Challenges in Securing Vehicular Networks , 2005 .
[13] Haiyun Luo,et al. Ad Hoc Network Security , 2004, Mobile Computing Handbook.
[14] S. Eichler,et al. Secure routing in a vehicular ad hoc network , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[15] Bertrand Ducourthial,et al. Sybil Nodes Detection Based on Received Signal Strength Variations within VANET , 2009, Int. J. Netw. Secur..
[16] Olivier Festor,et al. Group Key Management in MANETs , 2008, Int. J. Netw. Secur..
[17] Pin-Han Ho,et al. GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.
[18] Panagiotis Papadimitratos,et al. Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.
[19] Sebastian Mödersheim,et al. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.
[20] M. Shawky,et al. Localization verification and distinguishability degree in wireless networks using received signal strength variations , 2007, 2007 International Symposium on Communications and Information Technologies.
[21] Yueh-Min Huang,et al. A novel secure communication scheme in vehicular ad hoc networks , 2008, Comput. Commun..
[22] Victor C. M. Leung,et al. Secure Location Verification for Vehicular Ad-Hoc Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[23] Adrian Perrig,et al. Efficient mechanisms to provide convoy member and vehicle sequence authentication in VANETs , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[24] Jessica Staddon,et al. Detecting and correcting malicious data in VANETs , 2004, VANET '04.
[25] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[26] Enrico Minack. Evaluation of the influence of channel conditions on Car2X Communication , 2005 .
[27] Elaine Shi,et al. TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[28] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[29] Lothar Stibor,et al. Neighborhood evaluation of vehicular ad-hoc network using IEEE 802.11p , 2007 .