暂无分享,去创建一个
Panagiotis Papadimitratos | Mohammad Khodaei | Nikolaos Alexiou | Stylianos Gisdakis | Marcello Laganà | M. Khodaei | Panos Papadimitratos | S. Gisdakis | Marcello Lagana | N. Alexiou
[1] Jan Camenisch,et al. How to win the clonewars: efficient periodic n-times anonymous authentication , 2006, CCS '06.
[2] Panagiotis Papadimitratos,et al. Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.
[3] Panagiotis Papadimitratos,et al. SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.
[4] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[5] Zhendong Ma,et al. Privacy in inter-vehicular networks: Why simple pseudonym change is not enough , 2010, 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS).
[6] Yuguang Fang,et al. AC-PKI: anonymous and certificateless public-key infrastructure for mobile ad hoc networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[7] Panagiotis Papadimitratos,et al. Impact of vehicular communications security on transportation safety , 2008, IEEE INFOCOM Workshops 2008.
[8] Eylem Ekici,et al. Wireless Access in Vehicular Environments , 2009, EURASIP J. Wirel. Commun. Netw..
[9] Panagiotis Papadimitratos,et al. Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.
[10] Tim Leinmüller,et al. Secure and efficient beaconing for vehicular networks , 2008, VANET '08.
[11] Levente Buttyán,et al. On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs , 2007, ESAS.
[12] Maxim Raya,et al. The security of VANETs , 2005, VANET '05.
[13] Michael Weber,et al. V-Tokens for Conditional Pseudonymity in VANETs , 2010, 2010 IEEE Wireless Communication and Networking Conference.
[14] Panagiotis Papadimitratos,et al. Secure vehicular communication systems: implementation, performance, and research challenges , 2008, IEEE Communications Magazine.
[15] Sehyun Park,et al. Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications , 2003, ACISP.
[16] Adrian Perrig,et al. Challenges in Securing Vehicular Networks , 2005 .
[17] Sean W. Smith,et al. BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs , 2010, TSEC.