Identity privacy-based reliable routing method in VANETs
暂无分享,去创建一个
Xiaojing Wang | Limin Sun | Di Wu | Yan Ling | Dongxia Zhang
[1] Mehdi Bennis,et al. Non-cooperative operators in a game-theoretic framework , 2008, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications.
[2] Fotini-Niovi Pavlidou,et al. Game theory for routing modeling in communication networks — A survey , 2008, Journal of Communications and Networks.
[3] Pin-Han Ho,et al. An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[4] Gongjun Yan,et al. An efficient geographic location-based security mechanism for vehicular adhoc networks , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.
[5] Eitan Altman,et al. Non-cooperative routing in loss networks , 2002, Perform. Evaluation.
[6] Pin-Han Ho,et al. Secure Vehicular Communications Based on Group Signature and ID-Based Signature Scheme , 2007, 2007 IEEE International Conference on Communications.
[7] K. Jayarajan,et al. A noncooperative game approach for intrusion detection in Mobile Adhoc networks , 2008, 2008 International Conference on Computing, Communication and Networking.
[8] Pin-Han Ho,et al. GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.
[9] Yi-Bing Lin,et al. An efficient identity-based cryptosystem for end-to-end mobile security , 2006, IEEE Transactions on Wireless Communications.
[10] Kemal Ertugrul Tepe,et al. Game theoretic approach in routing protocol for wireless ad hoc networks , 2009, Ad Hoc Networks.
[11] Pin-Han Ho,et al. TSVC: timed efficient and secure vehicular communications with privacy preserving , 2008, IEEE Transactions on Wireless Communications.
[12] Maxim Raya,et al. Securing vehicular ad hoc networks , 2007, J. Comput. Secur..
[13] Pin-Han Ho,et al. ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[14] Pin-Han Ho,et al. RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks , 2008, 2008 IEEE International Conference on Communications.
[15] Yuguang Fang,et al. An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.
[16] Sagar Naik,et al. Exploiting temporal dependency for opportunistic forwarding in urban vehicular networks , 2011, 2011 Proceedings IEEE INFOCOM.
[17] Songwu Lu,et al. Secure Incentives for Commercial Ad Dissemination in Vehicular Networks , 2012, IEEE Trans. Veh. Technol..
[18] Josep Domingo-Ferrer,et al. A Scalable Robust Authentication Protocol for Secure Vehicular Communications , 2010, IEEE Transactions on Vehicular Technology.
[19] Xiaohui Liang,et al. STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs , 2011, 2011 Proceedings IEEE INFOCOM.
[20] Srdjan Capkun,et al. The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.
[21] Xiaodong Lin,et al. SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks , 2009, 2010 Proceedings IEEE INFOCOM.
[22] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[23] Songwu Lu,et al. Secure Incentives for Commercial Ad Dissemination in Vehicular Networks , 2007, IEEE Transactions on Vehicular Technology.
[24] Kyung-Joon Park,et al. Noncooperative carrier sense game in wireless networks , 2009, IEEE Transactions on Wireless Communications.
[25] Elmar Schoch,et al. Communication patterns in VANETs , 2008, IEEE Communications Magazine.