Efficient Self-organized Trust Management in Location Privacy Enhanced VANETs
暂无分享,去创建一个
[1] Pin-Han Ho,et al. A Trust Modeling Framework for Message Propagation and Evaluation in VANETs , 2010, 2010 2nd International Conference on Information Technology Convergence and Services.
[2] Raja Sengupta,et al. Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks , 2004 .
[3] Gongjun Yan,et al. Providing VANET security through active position detection , 2008, Comput. Commun..
[4] Tim Leinmüller,et al. Trust Issues for Vehicular Ad Hoc Networks , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.
[5] K. J. Ray Liu,et al. Attack-resistant cooperation stimulation in autonomous ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.
[6] Josep Domingo-Ferrer,et al. Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications , 2010, IEEE Transactions on Vehicular Technology.
[7] Tim Leinmüller,et al. Improved security in geographic ad hoc routing through autonomous position verification , 2006, VANET '06.
[8] Xue Liu,et al. A trust model based on fuzzy recommendation for mobile ad-hoc networks , 2009, Comput. Networks.
[9] Tim Leinmüller,et al. POSITION VERIFICATION APPROACHES FOR VEHICULAR AD HOC NETWORKS , 2006, IEEE Wireless Communications.
[10] Tim Leinmüller,et al. Exploration of adaptive beaconing for efficient intervehicle safety communication , 2010, IEEE Network.
[11] Yiming Yang,et al. A re-examination of text categorization methods , 1999, SIGIR '99.
[12] Zhu Han,et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[13] Jie Zhang,et al. A Survey on Trust Management for VANETs , 2011, 2011 IEEE International Conference on Advanced Information Networking and Applications.
[14] Damla Turgut,et al. Secure traffic data propagation in Vehicular Ad Hoc Networks , 2010, Int. J. Ad Hoc Ubiquitous Comput..
[15] Jie Lin,et al. A survey on trust management for intelligent transportation system , 2011, CTS '11.
[16] Panagiotis Papadimitratos,et al. Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.
[17] Thomas M. Chen,et al. Dempster-Shafer theory for intrusion detection in ad hoc networks , 2005, IEEE Internet Computing.
[18] Pin-Han Ho,et al. AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks , 2008, 2008 IEEE International Conference on Communications.
[19] Florian Dotzer,et al. Enhancing the Security of Local DangerWarnings in VANETs - A Simulative Analysis of Voting Schemes , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[20] Florian Dotzer,et al. VARS: a vehicle ad-hoc network reputation system , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.
[21] Glenn Geers,et al. CTS 2011 Workshop Report: the Fourth International Workshop on Computational Transportation Science: (Chicago, Illinois - November 1, 2011) , 2012, SIGSPACIAL.
[22] Jessica Staddon,et al. Detecting and correcting malicious data in VANETs , 2004, VANET '04.
[23] Nai-Wei Lo,et al. A Reputation System for Traffic Safety Event on Vehicular Ad Hoc Networks , 2009, EURASIP J. Wirel. Commun. Netw..
[24] Arobinda Gupta,et al. Detecting misbehaviors in VANET with integrated root-cause analysis , 2010, Ad Hoc Networks.
[25] Yue Ivan Wu,et al. Beacon-Aided Adaptive Localization of Noise Sources Aboard a Pass-By Railcar Using a Trackside Microphone Array , 2010, IEEE Transactions on Vehicular Technology.
[26] Hannes Hartenstein,et al. Proceedings of the 3rd international workshop on Vehicular ad hoc networks , 2006, MobiCom 2006.
[27] Sung-Hyuk Cha. Comprehensive Survey on Distance/Similarity Measures between Probability Density Functions , 2007 .
[28] Panagiotis Papadimitratos,et al. On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[29] Nei Kato,et al. NIS01-2: A Collusion Attack Against OLSR-based Mobile Ad Hoc Networks , 2006, IEEE Globecom 2006.
[30] Anupam Joshi,et al. Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory , 2009, 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware.
[31] Pin-Han Ho,et al. Security in vehicular ad hoc networks , 2008, IEEE Commun. Mag..
[32] Hamada M. Zahera,et al. Query Recommendation for Improving Search Engine Results , 2011, Int. J. Inf. Retr. Res..