Security Considerations on 5G-Enabled Back-Situation Awareness for CCAM
暂无分享,去创建一个
Roberto Riggio | Gianfranco Burzio | Silvio Ranise | Marco Centenaro | Stefano Berlato | Roberto Carbone | Giuseppe Faranda Cordella
[1] Wei Wang,et al. Evolutionary V2X Technologies Toward the Internet of Vehicles: Challenges and Opportunities , 2020, Proceedings of the IEEE.
[2] Sabrina De Capitani di Vimercati,et al. Access Control , 2014, Computing Handbook, 3rd ed..
[3] Giuseppe Bianchi,et al. Facilitating GDPR Compliance: The H2020 BPR4GDPR Approach , 2019, I3E Workshops.
[4] A. Ephremides,et al. A design concept for reliable mobile radio networks with frequency hopping signaling , 1987, Proceedings of the IEEE.
[5] Frank Kargl,et al. Pseudonym Schemes in Vehicular Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[6] Ravi Sandhu,et al. Secure V2V and V2I Communication in Intelligent Transportation using Cloudlets , 2020, ArXiv.
[7] William Stallings,et al. Communications architectures , 1992 .
[8] Xiaodong Lin,et al. The Security of Autonomous Driving: Threats, Defenses, and Future Directions , 2020, Proceedings of the IEEE.