暂无分享,去创建一个
[1] Jing Deng,et al. Wireless ad hoc networks , 2003 .
[2] W. Effelsberg,et al. Vehicular ad-hoc networks: from vision to reality and back , 2007, 2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services.
[3] Tim Leinmüller,et al. Trust Issues for Vehicular Ad Hoc Networks , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.
[4] Gongjun Yan,et al. Providing VANET security through active position detection , 2008, Comput. Commun..
[5] Murat Demirbas,et al. An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[6] E. Schoch,et al. Security requirements and solution concepts in vehicular ad hoc networks , 2007, 2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services.
[7] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[8] Emin Gün Sirer,et al. Herbivore: A Scalable and Efficient Protocol for Anonymous Communication , 2003 .
[9] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[10] Bin Xiao,et al. Detection and localization of sybil nodes in VANETs , 2006, DIWANS '06.
[11] Farooq Anjum,et al. Security for Wireless Ad Hoc Networks , 2007 .
[12] Damla Turgut,et al. Defense against Sybil attack in vehicular ad hoc network based on roadside unit support , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[13] Ghassan Samara. Efficient certificate management in VANET , 2010, 2010 2nd International Conference on Future Computer and Communication.
[14] Amer Aijaz,et al. Attacks on Inter Vehicle Communication Systems-an Analysis , 2005 .
[15] William A. Arbaugh,et al. Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[16] Christer Andersson,et al. Self-certified Sybil-Free Pseudonyms : Introducing Privacy in Infrastructureless Wireless Networks , 2007 .
[17] Sajid Hussain,et al. Using Received Signal Strength Variation for Energy Efficient Data Dissemination in Wireless Sensor Networks , 2007 .
[18] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[19] Panagiotis Papadimitratos,et al. Securing Vehicular Communications - Assumptions, Requirements, and Principles , 2006 .
[20] Sajid Hussain,et al. Using Received Signal Strength Variation for Energy Efficient Data Dissemination in Wireless Sensor Networks , 2007, 18th International Workshop on Database and Expert Systems Applications (DEXA 2007).
[21] Maxim Raya,et al. Securing vehicular ad hoc networks , 2007, J. Comput. Secur..
[22] Dharma P. Agrawal,et al. Security in Wireless Ad Hoc Networks , 2005, Handbook of Algorithms for Wireless Networking and Mobile Computing.
[23] Pin-Han Ho,et al. Secure Vehicular Communications Based on Group Signature and ID-Based Signature Scheme , 2007, 2007 IEEE International Conference on Communications.