AMOEBA: Robust Location Privacy Scheme for VANET
暂无分享,去创建一个
Radha Poovendran | Krishna Sampigethaya | Mingyan Li | Leping Huang | R. Poovendran | Mingyan Li | K. Sampigethaya | Leping Huang
[1] Christoph Schroth,et al. Simulating the traffic effects of vehicle-to-vehicle messaging systems , 2005 .
[2] Tim Leinmüller,et al. Impact of Pseudonym Changes on Geographic Routing in VANETs , 2006, ESAS.
[3] Ahmed Helmy,et al. IMPORTANT: a framework to systematically analyze the Impact of Mobility on Performance of Routing Protocols for Adhoc Networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[4] S Ueda,et al. JAPAN'S POLICIES ON RESEARCH AND DEVELOPMENT OF THE ADVANCED CRUISE-ASSIST SYSTEM , 1999 .
[5] Alastair R. Beresford,et al. Location privacy in ubiquitous computing , 2005 .
[6] M. Guainazzo,et al. Location determination using WLAN in conjunction with GPS network (Global Positioning System) , 2004, 2004 IEEE 59th Vehicular Technology Conference. VTC 2004-Spring (IEEE Cat. No.04CH37514).
[7] D. Clawin,et al. Wireless LAN performance under varied stress conditions in vehicular traffic scenarios , 2002, Proceedings IEEE 56th Vehicular Technology Conference.
[8] J. F. Gabard. Car-Following Models , 1991 .
[9] Andreas Pfitzmann,et al. Networks Without User Observability: Design Options , 1985, EUROCRYPT.
[10] Kiyohito Tokuda,et al. Vehicle control algorithms for cooperative driving with automated vehicles and intervehicle communications , 2002, IEEE Trans. Intell. Transp. Syst..
[11] Fabián E. Bustamante,et al. An integrated mobility and traffic model for vehicular wireless networks , 2005, VANET '05.
[12] A. M. Mathai. An Introduction to Geometrical Probability: Distributional Aspects with Applications , 1999 .
[13] Nalini Venkatasubramanian,et al. Security Issues in a Future Vehicular Network , 2002 .
[14] Markus Jakobsson,et al. Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking , 2002, USENIX Security Symposium.
[15] R. Poovendran,et al. CARAVAN: Providing Location Privacy for VANET , 2005 .
[16] Jeffrey H. Reed,et al. Position location using wireless communications on highways of the future , 1996, IEEE Commun. Mag..
[17] Yilin Zhao,et al. Mobile phone location determination and its impact on intelligent transportation systems , 2000, IEEE Trans. Intell. Transp. Syst..
[18] Roger Dingledine,et al. From a Trickle to a Flood: Active Attacks on Several Mix Types , 2002, Information Hiding.
[19] Marco Gruteser,et al. USENIX Association , 1992 .
[20] Kaoru Sezaki,et al. Enhancing wireless location privacy using silent period , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[21] Ivan Seskar,et al. Rate of location area updates in cellular systems , 1992, [1992 Proceedings] Vehicular Technology Society 42nd VTS Conference - Frontiers of Technology.
[22] Cem Ersoy. Location Tracking and Location Based Service Using IEEE 802 . 11 WLAN Infrastructure , 2003 .
[23] George Danezis,et al. Towards an Information Theoretic Metric for Anonymity , 2002, Privacy Enhancing Technologies.
[24] Marco Gruteser,et al. Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis , 2003, WMASH '03.
[25] Alexander Russell,et al. Perfect information leader election in log*n+O(1) rounds , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).
[26] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[27] R. Rothery. CAR FOLLOWING MODELS , 1997 .
[28] Amit Kumar Saha,et al. Modeling mobility for vehicular ad-hoc networks , 2004, VANET '04.
[29] Maxim Raya,et al. Security Aspects of Inter-Vehicle Communications , 2005 .
[30] Damon McCoy,et al. Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting , 2006, USENIX Security Symposium.
[31] A. Pfitzmann,et al. Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology , 2002 .
[32] Jessica Staddon,et al. Detecting and correcting malicious data in VANETs , 2004, VANET '04.
[33] R.T. Johnk,et al. Electromagnetic signatures of WLAN cards and network security , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..
[34] Alexander Russell,et al. Perfect Information Leader Election in log* n+O (1) Rounds , 2001, J. Comput. Syst. Sci..
[35] Nigel Davies,et al. Preserving Privacy in Environments with Location-Based Applications , 2003, IEEE Pervasive Comput..
[36] Jan Camenisch,et al. An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation , 2001, IACR Cryptol. ePrint Arch..
[37] Maxim Raya,et al. Efficient secure aggregation in VANETs , 2006, VANET '06.
[38] Maxim Raya,et al. The security of vehicular ad hoc networks , 2005, SASN '05.
[39] Marco Gruteser,et al. Framework for security and privacy in automotive telematics , 2002, WMC '02.
[40] Pierangela Samarati,et al. Generalizing Data to Provide Anonymity when Disclosing Information , 1998, PODS 1998.
[41] Srdjan Capkun,et al. The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.
[42] Richard E. Newman,et al. On the Anonymity of Timed Pool Mixes , 2003, SEC.
[43] Radha Poovendran,et al. Swing & swap: user-centric approaches towards maximizing location privacy , 2006, WPES '06.
[44] Kaoru Sezaki,et al. Towards Modeling Wireless Location Privacy , 2005, Privacy Enhancing Technologies.
[45] Radha Poovendran,et al. A Survey on Mix Networks and Their Secure Applications , 2006, Proceedings of the IEEE.
[46] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.