Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles
暂无分享,去创建一个
José María de Fuentes | Lorena González-Manzano | Jorge Blasco Alís | Ana Isabel González-Tablas Ferreres
[1] María Isabel González Vasco,et al. A Subliminal-Free Variant of ECDSA , 2006, Information Hiding.
[2] Panagiotis Papadimitratos,et al. Design and Performance of Secure Geocast for Vehicular Communication , 2010, IEEE Transactions on Vehicular Technology.
[3] Fan Bai,et al. Reliability Analysis of DSRC Wireless Communication for Vehicle Safety Applications , 2006, 2006 IEEE Intelligent Transportation Systems Conference.
[4] Christian Bäcker,et al. Subliminal Channels in Cryptographic Systems , 2009 .
[5] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[6] Ana I. González-Tablas,et al. Towards an automatic enforcement for speeding: enhanced model and intelligent transportation systems realisation , 2012 .
[7] Gustavus J. Simmons,et al. Subliminal Communication is Easy Using the DSA , 1994, EUROCRYPT.
[8] Ozan K. Tonguz,et al. Network Connectivity of VANETs in Urban Areas , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[9] Norsheila Fisal,et al. Overview of Wireless Access in Vehicular Environment (WAVE) protocols and standards , 2013 .
[10] Yuan Wen Hau,et al. A tightly coupled finite field arithmetic hardware in an FPGA-based embedded processor core for elliptic curve cryptography , 2008 .
[11] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[12] Mohamed Khalil Hani,et al. A tightly coupled finite field arithmetic hardware in an FPGA-based embedded processor core for elliptic curve cryptography , 2008, 2008 International Conference on Electronic Design.
[13] Sebastian Zander,et al. A survey of covert channels and countermeasures in computer network protocols , 2007, IEEE Communications Surveys & Tutorials.
[14] Miodrag Potkonjak,et al. Real-time watermarking techniques for sensor networks , 2003, IS&T/SPIE Electronic Imaging.
[15] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[16] James W. Moore,et al. Institute of Electrical and Electronics Engineers (IEEE) , 2002 .
[17] Sushil Jajodia,et al. Chaining watermarks for detecting malicious modifications to streaming data , 2007, Inf. Sci..
[18] Radu Sion,et al. On Watermarking Numeric Sets , 2002, IWDW.
[19] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[20] Guang Gong,et al. Elliptic Curve Digital Signatures and Accessories , 2007 .
[21] Elmar Schoch,et al. On the efficiency of secure beaconing in VANETs , 2010, WiSec '10.
[22] José María de Fuentes,et al. WEVAN - A mechanism for evidence creation and verification in VANETs , 2013, J. Syst. Archit..