A Traffic Flow Theory Aided Physical Measurement-Based Sybil Nodes Detection Mechanism in Vehicular Ad-hoc Networks
暂无分享,去创建一个
[1] Sunilkumar S. Manvi,et al. Issues in Mobile Ad hoc Networks for Vehicular Communication , 2008 .
[2] Brian Neil Levine,et al. A Survey of Solutions to the Sybil Attack , 2006 .
[3] Nader Moayeri,et al. Design of Secure and Application-Oriented VANETs , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.
[4] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[5] J.-P. Hubaux,et al. Architecture for Secure and Private Vehicular Communications , 2007, 2007 7th International Conference on ITS Telecommunications.
[6] Maria Kihl,et al. Inter-vehicle communication systems: a survey , 2008, IEEE Communications Surveys & Tutorials.
[7] W. Marsden. I and J , 2012 .
[8] William A. Arbaugh,et al. Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[9] Panagiotis Papadimitratos,et al. Securing Vehicular Communications - Assumptions, Requirements, and Principles , 2006 .
[10] Zhiyi Fang,et al. Securing Vehicular Ad Hoc Networks , 2007, 2007 2nd International Conference on Pervasive Computing and Applications.
[11] Srdjan Capkun,et al. The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.
[12] Thomas Nowey,et al. Towards a security architecture for vehicular ad hoc networks , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[13] Nader Moayeri,et al. Design Secure and Application-oriented Vanet , 2008 .
[14] Panagiotis Papadimitratos,et al. SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.
[15] Jie Luo,et al. A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment , 2010, 2010 International Conference on Communications and Mobile Computing.
[16] Teruhiko Teraoka,et al. Organization and exploration of heterogeneous personal data collected in daily life , 2012, Human-centric Computing and Information Sciences.
[17] E. Schoch,et al. Security requirements and solution concepts in vehicular ad hoc networks , 2007, 2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services.
[18] Markulf Kohlweiss,et al. Self-certified Sybil-free pseudonyms , 2008, WiSec '08.
[19] Tim Leinmüller,et al. Trust Issues for Vehicular Ad Hoc Networks , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.
[20] Amer Aijaz,et al. Attacks on Inter Vehicle Communication Systems-an Analysis , 2005 .
[21] Luca Delgrossi,et al. IEEE 802.11p: Towards an International Standard for Wireless Access in Vehicular Environments , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.
[22] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.