PREparing SEcuRe VEhicle-to-X Communication Systems
暂无分享,去创建一个
[1] Harald Baier,et al. Validity Models of Electronic Signatures and Their Enforcement in Practice , 2009, EuroPKI.
[2] Zhendong Ma,et al. Privacy Requirements in Vehicular Communication Systems , 2009, 2009 International Conference on Computational Science and Engineering.
[3] David Chaum,et al. Group Signatures , 1991, EUROCRYPT.
[4] Alfred Menezes,et al. Pairing-Based Cryptography at High Security Levels , 2005, IMACC.
[5] Helen J. Wang,et al. Preserving location privacy in wireless lans , 2007, MobiSys '07.
[6] Ling Liu,et al. Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[7] Panagiotis Papadimitratos. “On the Road” - Reflections on the security of Vehicular communication systems , 2008, 2008 IEEE International Conference on Vehicular Electronics and Safety.
[8] Hui Xiong,et al. Achieving Guaranteed Anonymity in GPS Traces via Uncertainty-Aware Path Cloaking , 2010, IEEE Transactions on Mobile Computing.
[9] Panagiotis Papadimitratos,et al. Secure vehicular communication systems: implementation, performance, and research challenges , 2008, IEEE Communications Magazine.
[10] Peter Eckersley,et al. How Unique Is Your Web Browser? , 2010, Privacy Enhancing Technologies.
[11] Sha Tao,et al. Securing smartphone based ITS , 2011, 2011 11th International Conference on ITS Telecommunications.
[12] Gene Tsudik,et al. Group signatures á la carte , 1999, SODA '99.
[13] Panagiotis Papadimitratos,et al. Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.
[14] Srdjan Capkun,et al. Secure Location Verification with Hidden and Mobile Base Stations , 2008, IEEE Transactions on Mobile Computing.
[15] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[16] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[17] Marco Gruteser,et al. Protecting privacy, in continuous location-tracking applications , 2004, IEEE Security & Privacy Magazine.
[18] Srdjan Capkun,et al. Secure neighborhood discovery: a fundamental element for mobile ad hoc networking , 2008, IEEE Communications Magazine.
[19] Elmar Schoch,et al. Communication patterns in VANETs , 2008, IEEE Communications Magazine.
[20] Jonathan Petit,et al. Analysis of ECDSA Authentication Processing in VANETs , 2009, 2009 3rd International Conference on New Technologies, Mobility and Security.
[21] Alfred Menezes,et al. Software Implementation of the NIST Elliptic Curves Over Prime Fields , 2001, CT-RSA.
[22] Tao Zhang,et al. Enforcing Privacy Using Symmetric Random Key-Set in Vehicular Networks , 2007, Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07).
[23] David K. Y. Yau,et al. Privacy vulnerability of published anonymous mobility traces , 2010, MobiCom.
[24] Pin-Han Ho,et al. An Efficient Message Authentication Scheme for Vehicular Communications , 2008, IEEE Transactions on Vehicular Technology.
[25] Pin-Han Ho,et al. ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[26] J.-P. Hubaux,et al. Architecture for Secure and Private Vehicular Communications , 2007, 2007 7th International Conference on ITS Telecommunications.
[27] Guohong Cao,et al. APPLAUS: A Privacy-Preserving Location Proof Updating System for location-based services , 2011, 2011 Proceedings IEEE INFOCOM.
[28] Hovav Shacham,et al. Group signatures with verifier-local revocation , 2004, CCS '04.
[29] Ke Zeng,et al. Pseudonymous PKI for Ubiquitous Computing , 2006, EuroPKI.
[30] Panagiotis Papadimitratos,et al. Scalable & Resilient Vehicle-Centric Certificate Revocation List Distribution in Vehicular Communication Systems , 2020, IEEE Transactions on Mobile Computing.
[31] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[32] Panagiotis Papadimitratos,et al. Collaborative Location Privacy , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.
[33] Jean-Pierre Hubaux,et al. Privacy and Identity Management for Vehicular Communication Systems: a Position Paper , 2006 .
[34] Panos Kalnis,et al. Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.
[35] Levente Buttyán,et al. On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs , 2007, ESAS.
[36] Adrian Perrig,et al. Flexible, extensible, and efficient VANET authentication , 2009, Journal of Communications and Networks.
[37] Dijiang Huang,et al. PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs , 2011, IEEE Transactions on Intelligent Transportation Systems.
[38] Rui L. Aguiar,et al. Support of Anonymity in VANETs - Putting Pseudonymity into Practice , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[39] Tim Leinmüller,et al. Secure and efficient beaconing for vehicular networks , 2008, VANET '08.
[40] Frederik Armknecht,et al. Cross-layer Privacy Enhancement and Non-repudiation in Vehicular Communication , 2011 .
[41] Panagiotis Papadimitratos,et al. On the Performance of Secure Vehicular Communication Systems , 2011, IEEE Transactions on Dependable and Secure Computing.
[42] Tyler Moore,et al. Information Security Economics - and Beyond , 2007, DEON.
[43] Michael Weber,et al. V-Tokens for Conditional Pseudonymity in VANETs , 2010, 2010 IEEE Wireless Communication and Networking Conference.
[44] Jean-Pierre Hubaux,et al. Adaptive Message Authentication for multi-hop networks , 2011, 2011 Eighth International Conference on Wireless On-Demand Network Systems and Services.
[45] David Chaum,et al. Distance-Bounding Protocols (Extended Abstract) , 1994, EUROCRYPT.
[46] Reza Shokri,et al. MobiCrowd: A Collaborative Location-Privacy Preserving Mobile Proxy , 2010, Mobisys 2010.
[47] Markus Jakobsson,et al. Balancing auditability and privacy in vehicular networks , 2005, Q2SWinet '05.
[48] Panagiotis Papadimitratos,et al. On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[49] Claudia Eckert,et al. Revocable Anonymous Authenticated Inter-Vehicle Communication (SRAAC) , 2006 .
[50] Marco Fiore,et al. Secure neighbor position discovery in vehicular networks , 2011, 2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop.
[51] Zhendong Ma,et al. Privacy in inter-vehicular networks: Why simple pseudonym change is not enough , 2010, 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS).
[52] Elmar Schoch,et al. A Generic Public Key Infrastructure for Securing Car-to-X Communication , 2011 .
[53] Paul F. Syverson,et al. Group Principals and the Formalization of Anonymity , 1999, World Congress on Formal Methods.
[54] Dong Hoon Lee,et al. Anonymous and Traceable Communication Using Tamper-Proof Device for Vehicular Ad Hoc Networks , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).
[55] Panagiotis Papadimitratos,et al. Impact of vehicular communications security on transportation safety , 2008, IEEE INFOCOM Workshops 2008.
[56] Romit Roy Choudhury,et al. Hiding stars with fireworks: location privacy through camouflage , 2009, MobiCom '09.
[57] Hovav Shacham,et al. Short Group Signatures , 2004, CRYPTO.
[58] Panagiotis Papadimitratos,et al. Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.
[59] Panagiotis Papadimitratos,et al. Secure neighbor discovery in wireless networks: formal investigation of possibility , 2008, ASIACCS '08.
[60] Reza Shokri,et al. A distortion-based metric for location privacy , 2009, WPES '09.
[61] Srdjan Capkun,et al. Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[62] Siu-Ming Yiu,et al. Identity Based Threshold Ring Signature , 2004, IACR Cryptol. ePrint Arch..
[63] Kenneth G. Paterson,et al. A comparison between traditional public key infrastructures and identity-based cryptography , 2003, Inf. Secur. Tech. Rep..
[64] Panagiotis Papadimitratos,et al. Securing Vehicular Communications - Assumptions, Requirements, and Principles , 2006 .
[65] Matthias Gerlach,et al. Privacy in VANETs using Changing Pseudonyms - Ideal and Real , 2007, 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring.
[66] Srdjan Capkun,et al. The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.
[67] Marco Gruteser,et al. USENIX Association , 1992 .
[68] Mihir Bellare,et al. Foundations of Group Signatures: The Case of Dynamic Groups , 2005, CT-RSA.
[69] Zhong Chen,et al. Proof-of-relevance: Filtering false data via authentic consensus in Vehicle Ad-hoc Networks , 2008, IEEE INFOCOM Workshops 2008.
[70] Ernest F. Brickell,et al. Direct anonymous attestation , 2004, CCS '04.
[71] Adrian Perrig,et al. Challenges in Securing Vehicular Networks , 2005 .
[72] Michael J. Fischer,et al. The Consensus Problem in Unreliable Distributed Systems (A Brief Survey) , 1983, FCT.
[73] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[74] Jan Camenisch,et al. How to win the clonewars: efficient periodic n-times anonymous authentication , 2006, CCS '06.
[75] Panagiotis Papadimitratos,et al. Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.
[76] Richard J. Hanowski,et al. Driver Acceptance of Unreliable Traffic Information in Familiar and Unfamiliar Settings , 1997, Hum. Factors.
[77] Mihir Bellare,et al. Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions , 2003, EUROCRYPT.
[78] A. Pfitzmann,et al. A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management , 2010 .
[79] Claudia Eckert,et al. 506 Ways to Track Your Lover , 2008, 2008 IEEE 68th Vehicular Technology Conference.