Group Key Authentication scheme for Vanet INtrusion detection (GKAVIN)
暂无分享,去创建一个
[1] Mario Gerla,et al. Group-based secure source authentication protocol for VANETs , 2010, 2010 IEEE Globecom Workshops.
[2] Athanasios V. Vasilakos,et al. Mobile Cloud Computing: A Survey, State of Art and Future Directions , 2013, Mobile Networks and Applications.
[3] Xiaolei Dong,et al. Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..
[4] Athanasios V. Vasilakos,et al. Information centric network: Research challenges and opportunities , 2015, J. Netw. Comput. Appl..
[5] Athanasios V. Vasilakos,et al. Provably secure three-party authenticated key agreement protocol using smart cards , 2014, Comput. Networks.
[6] Athanasios V. Vasilakos,et al. A security and trust framework for virtualized networks and software-defined networking , 2016, Secur. Commun. Networks.
[7] Mrs.Kadam Megha. Security Analysis in VANETs: A Survey , 2012 .
[8] Nanhay Singh,et al. SECURITY CHALLENGES , ISSUES AND THEIR SOLUTIONS FOR VANET , 2013 .
[9] Athanasios V. Vasilakos,et al. Survey on channel reciprocity based key establishment techniques for wireless systems , 2015, Wirel. Networks.
[10] Yen-Fu Liu,et al. Secure Communication Scheme of VANET with Privacy Preserving , 2011, 2011 IEEE 17th International Conference on Parallel and Distributed Systems.
[11] Athanasios V. Vasilakos,et al. Reliable Multicast with Pipelined Network Coding Using Opportunistic Feeding and Routing , 2014, IEEE Transactions on Parallel and Distributed Systems.
[12] Athanasios V. Vasilakos,et al. DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis , 2010, IEEE/ACM Transactions on Networking.
[13] Hassan Artail,et al. REACT: Secure and efficient data acquisition in VANETs , 2011, 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[14] Vinh Hoa La,et al. SECURITY ATTACKS AND SOLUTIONS IN VEHICULAR AD HOC NETWORKS : A SURVEY , 2014 .
[15] Ping Yu,et al. Electronic Health Record , 2012, Encyclopedia of Gerontology and Population Aging.
[16] Athanasios V. Vasilakos,et al. Leveraging software-defined networking for security policy enforcement , 2016, Inf. Sci..
[17] Parminder Singh,et al. An Encryption Algorithm to Evaluate Performance of V2V Communication in Vanet , 2013 .
[18] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[19] Gongjun Yan,et al. Securing Vehicular Ad-hoc Networks Against Malicious Drivers: A Probabilistic Approach , 2011, 2011 International Conference on Complex, Intelligent, and Software Intensive Systems.
[20] Athanasios V. Vasilakos,et al. SecCloud: Bridging Secure Storage and Computation in Cloud , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops.
[21] Kannikar Siriwong Na Ayutaya,et al. A Novel Message Fabrication Detection for Beaconless Routing in VANETs , 2009, 2009 International Conference on Communication Software and Networks.
[22] Prajwal Gaikwad,et al. Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backscatter , 2017 .
[23] Athanasios V. Vasilakos,et al. A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..
[24] Pingzhi Fan,et al. b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET , 2013, IEEE Transactions on Information Forensics and Security.
[25] Donghyun Kim,et al. On Secure , Privacy-aware , and Efficient Beacon Broadcasting among One-hop Neighbors in Vehicular Adhoc Networks , 2014 .
[26] Fuad A. Ghaleb,et al. Security and privacy enhancement in VANETs using mobility pattern , 2013, 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN).
[27] Madhavi Sinha,et al. Overview on vehicular ad hoc network and its security issues , 2014, 2014 International Conference on Computing for Sustainable Global Development (INDIACom).