Framework to Support Per Second Shifts of Pseudonyms in Regional VANETs
暂无分享,去创建一个
[1] Maxim Raya,et al. Securing vehicular ad hoc networks , 2007, J. Comput. Secur..
[2] Yih-Chun Hu,et al. The impact of key assignment on VANET privacy , 2010, Secur. Commun. Networks.
[3] William E. Burr,et al. Recommendation for Key Management, Part 1: General (Revision 3) , 2006 .
[4] S. Verma,et al. Message broadcast in VANETs using group signature , 2008, 2008 Fourth International Conference on Wireless Communication and Sensor Networks.
[5] J.-P. Hubaux,et al. Architecture for Secure and Private Vehicular Communications , 2007, 2007 7th International Conference on ITS Telecommunications.
[6] Michael Weber,et al. Pseudonym-On-Demand: A New Pseudonym Refill Strategy for Vehicular Communications , 2008, 2008 IEEE 68th Vehicular Technology Conference.
[7] Maxim Raya,et al. Revocation games in ephemeral networks , 2008, CCS.
[8] Yih-Chun Hu,et al. Design and analysis of a lightweight certificate revocation mechanism for VANET , 2009, VANET '09.
[9] Panagiotis Papadimitratos,et al. Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.
[10] Josep Domingo-Ferrer,et al. A Scalable Robust Authentication Protocol for Secure Vehicular Communications , 2010, IEEE Transactions on Vehicular Technology.
[11] Bhargav Bellur,et al. Certificate Assignment Strategies for a PKI-Based Security Architecture in a Vehicular Network , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[12] Elaine Shi,et al. TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[13] Christos Douligeris,et al. TwoHop: Metric-Based Trust Evaluation for Peer-to-Peer Collaboration Environments , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[14] Panagiotis Papadimitratos,et al. Fast Exclusion of Errant Devices from Vehicular Networks , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[15] Jianqing Li,et al. Effectively Changing Pseudonyms for Privacy Protection in VANETs , 2009, 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks.
[16] Charles Doyle,et al. Statutes of Limitation in Federal Criminal Cases: An Overview , 2012 .
[17] Arati Baliga,et al. Secure, pseudonymous, and auditable communication in vehicular ad hoc networks , 2008, Secur. Commun. Networks.
[18] Henry L. Owen,et al. The effects of limited lifetime pseudonyms on certificate revocation list size in VANETS , 2010, Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon).
[19] Maxim Raya,et al. The security of vehicular ad hoc networks , 2005, SASN '05.
[20] Shiyong Zhang,et al. Probabilistic Isolation of Malicious Vehicles in Pseudonym Changing VANETs , 2007, 7th IEEE International Conference on Computer and Information Technology (CIT 2007).
[21] Jessica Staddon,et al. Detecting and correcting malicious data in VANETs , 2004, VANET '04.