Detecting Sybil Attacks in Vehicular Ad Hoc Networks
暂无分享,去创建一个
Peng Ning | Krishnendu Chakrabarty | Romit Roy Choudhury | Tong Zhou | K. Chakrabarty | P. Ning | Tong Zhou
[1] Elaine Shi,et al. TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[2] Stefan Rass,et al. How to protect privacy in floating car data systems , 2008, VANET '08.
[3] Panagiotis Papadimitratos,et al. Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.
[4] Adrian Perrig,et al. Challenges in Securing Vehicular Networks , 2005 .
[5] Markus Jakobsson,et al. Balancing auditability and privacy in vehicular networks , 2005, Q2SWinet '05.
[6] R. Poovendran,et al. CARAVAN: Providing Location Privacy for VANET , 2005 .
[7] Jessica Staddon,et al. Detecting and correcting malicious data in VANETs , 2004, VANET '04.
[8] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[9] Philippe Flajolet,et al. Birthday Paradox, Coupon Collectors, Caching Algorithms and Self-Organizing Search , 1992, Discret. Appl. Math..