RescueMe: Location-Based Secure and Dependable VANETs for Disaster Rescue
暂无分享,去创建一个
[1] Roberto Rojas-Cessa,et al. Networking for critical conditions , 2008, IEEE Wireless Communications.
[2] Tolga Coplu,et al. SENDROM: Sensor networks for disaster relief operations management , 2007, Wirel. Networks.
[3] Amit Kumar,et al. A natural disasters management system based on location aware distributed sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[4] Stavros A. Koubias,et al. Architecture Design and Implementation of an Ad-Hoc Network for Disaster Relief Operations , 2007, IEEE Transactions on Industrial Informatics.
[5] Adi Shamir,et al. How to share a secret , 1979, CACM.
[6] Yuguang Fang,et al. A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[7] S. Galbraith,et al. Advances in Elliptic Curve Cryptography: Pairings , 2005 .
[8] Xiaofeng Chen,et al. ID-based restrictive partially blind signatures and applications , 2007, J. Syst. Softw..
[9] N. Ahmed,et al. SAFIRE: A Self-Organizing Architecture for Information Exchange between First Responders , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[10] Yi Mu,et al. Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings , 2006, Financial Cryptography.
[11] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[12] Paul F. Syverson,et al. Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..
[13] Paulo S. L. M. Barreto,et al. Efficient Algorithms for Pairing-Based Cryptosystems , 2002, CRYPTO.
[14] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[15] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[16] M. Matsumoto,et al. A framework for disaster management system and WSN protocol for rescue operation , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.
[17] Berk Sunar,et al. Cryptography on a Speck of Dust , 2007, Computer.
[18] Xin Huang,et al. WISTA: a wireless transmission system for disaster patient care , 2005, 2nd International Conference on Broadband Networks, 2005..
[19] Zhiyi Fang,et al. Securing Vehicular Ad Hoc Networks , 2007, 2007 2nd International Conference on Pervasive Computing and Applications.
[20] Paulo S. L. M. Barreto,et al. Efficient pairing computation on supersingular Abelian varieties , 2007, IACR Cryptol. ePrint Arch..
[21] Stefan BrandsCWI,et al. Untraceable Oo-line Cash in Wallets with Observers , 1993 .
[22] Hoon Wei Lim,et al. On the application of identity-based cryptography in grid security , 2006 .
[23] T. Fujiwara,et al. A framework for data collection system with sensor networks in disaster circumstances , 2004, International Workshop on Wireless Ad-Hoc Networks, 2004..
[24] Florian Hess,et al. Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.
[25] M. Heskamp,et al. A node architecture for disaster relief networking , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[26] Kevin R. Fall,et al. A delay-tolerant network architecture for challenged internets , 2003, SIGCOMM '03.