Evaluating on-demand pseudonym acquisition policies in vehicular communication systems
暂无分享,去创建一个
[1] William Whyte,et al. A security credential management system for V2V communications , 2013, 2013 IEEE Vehicular Networking Conference.
[2] Panagiotis Papadimitratos,et al. Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.
[3] Eylem Ekici,et al. Wireless Access in Vehicular Environments , 2009, EURASIP J. Wirel. Commun. Netw..
[4] C. Eckert,et al. Secure Revocable Anonymous Authenticated Inter-Vehicle Communication ( SRAAC ) , 2006 .
[5] Marco Fiore,et al. Generation and Analysis of a Large-Scale Urban Vehicular Mobility Dataset , 2014, IEEE Transactions on Mobile Computing.
[6] Panagiotis Papadimitratos,et al. SEROSA: SERvice oriented security architecture for Vehicular Communications , 2013, 2013 IEEE Vehicular Networking Conference.
[7] Frank Kargl,et al. PUCA: A pseudonym scheme with user-controlled anonymity for vehicular ad-hoc networks (VANET) , 2014, 2014 IEEE Vehicular Networking Conference (VNC).
[8] D. Sutherland,et al. On the road. , 1996, Nursing times.
[9] Panagiotis Papadimitratos,et al. VeSPA: vehicular security and privacy-preserving architecture , 2013, HotWiSec '13.
[10] Panagiotis Papadimitratos,et al. Securing Vehicular Communications - Assumptions, Requirements, and Principles , 2006 .
[11] Panagiotis Papadimitratos,et al. Towards deploying a scalable & robust vehicular identity and credential management infrastructure , 2014, 2014 IEEE Vehicular Networking Conference (VNC).
[12] Panagiotis Papadimitratos,et al. Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.
[13] Michael Weber,et al. V-Tokens for Conditional Pseudonymity in VANETs , 2010, 2010 IEEE Wireless Communication and Networking Conference.
[14] Frank Kargl,et al. PREparing SEcuRe VEhicle-to-X Communication Systems , 2011 .
[15] Panagiotis Papadimitratos,et al. The Key to Intelligent Transportation: Identity and Credential Management in Vehicular Communication Systems , 2015, IEEE Vehicular Technology Magazine.
[16] Panagiotis Papadimitratos,et al. Vehicular communication systems: Enabling technologies, applications, and future outlook on intelligent transportation , 2009, IEEE Communications Magazine.
[17] Panagiotis Papadimitratos. “On the Road” - Reflections on the security of Vehicular communication systems , 2008, 2008 IEEE International Conference on Vehicular Electronics and Safety.
[18] Thomas Engel,et al. Luxembourg SUMO Traffic (LuST) Scenario: 24 hours of mobility for vehicular networking research , 2015, 2015 IEEE Vehicular Networking Conference (VNC).
[19] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[20] Claudia Eckert,et al. Revocable Anonymous Authenticated Inter-Vehicle Communication (SRAAC) , 2006 .
[21] Kpatcha M. Bayarou,et al. Copra: Conditional pseudonym resolution algorithm in VANETs , 2013, 2013 10th Annual Conference on Wireless On-demand Network Systems and Services (WONS).
[22] ButtyanL.,et al. Secure vehicular communication systems , 2008 .