Strategies for Pseudonym Changes in Vehicular Ad Hoc Networks depending on Node Mobility
暂无分享,去创建一个
[1] Pierangela Samarati,et al. Location privacy in pervasive computing , 2008 .
[2] Srdjan Capkun,et al. The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.
[3] Christoph Schroth,et al. Simulation of car-to-car messaging: analyzing the impact on road traffic , 2005, 13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems.
[4] R. Poovendran,et al. CARAVAN: Providing Location Privacy for VANET , 2005 .
[5] Tracy Camp,et al. A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..
[6] Jean-Yves Le Boudec,et al. Perfect simulation and stationarity of a class of mobility models , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[7] A. Varga,et al. THE OMNET++ DISCRETE EVENT SIMULATION SYSTEM , 2003 .
[8] Nalini Venkatasubramanian,et al. Security Issues in a Future Vehicular Network , 2002 .
[9] A. Pfitzmann,et al. Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology , 2002 .
[10] Tim Leinmüller,et al. Impact of Pseudonym Changes on Geographic Routing in VANETs , 2006, ESAS.
[11] Adrian Perrig,et al. Security and Privacy in Sensor Networks , 2003, Computer.
[12] Andreas Meier,et al. Design of 5.9 ghz dsrc-based vehicular safety communication , 2006, IEEE Wireless Communications.
[13] Maxim Raya,et al. The security of vehicular ad hoc networks , 2005, SASN '05.
[14] Marco Gruteser,et al. Framework for security and privacy in automotive telematics , 2002, WMC '02.