VANET Authentication Using Trust Distribution in a Clustered Environment
暂无分享,去创建一个
[1] Prithwish Basu,et al. A mobility based metric for clustering in mobile ad hoc networks , 2001, Proceedings 21st International Conference on Distributed Computing Systems Workshops.
[2] Hugo Krawczyk,et al. Robust Threshold DSS Signatures , 1996, EUROCRYPT.
[3] Michael Gurstein,et al. Remote management of a province-wide youth employment program using Internet technologies , 1999 .
[4] Panagiotis Papadimitratos,et al. Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.
[5] P.H.J. Chong,et al. A survey of clustering schemes for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[6] Charalampos Konstantopoulos,et al. Clustering in mobile ad hoc networks through neighborhood stability-based mobility prediction , 2008, Comput. Networks.
[7] Azim Eskandarian,et al. Mobility management in IVC networks , 2003, IEEE IV2003 Intelligent Vehicles Symposium. Proceedings (Cat. No.03TH8683).
[8] Srdjan Capkun,et al. The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.
[9] Panagiotis Papadimitratos,et al. Secure Routing for Mobile Ad Hoc Networks , 2002 .
[10] Xiaoyuan Yang,et al. Dynamic Group Signature with Forward Security and Its Application , 2007, Sixth International Conference on Grid and Cooperative Computing (GCC 2007).
[11] Call for Chapters. Broadband Wireless Access Networks for 4G: Theory, Application, and Experimentation , 2013 .
[12] Taieb Znati,et al. A mobility-based framework for adaptive clustering in wireless ad hoc networks , 1999, IEEE J. Sel. Areas Commun..
[13] Mohd Dani Baba,et al. Hierarchical QoS Admission Control Mechanism for IEEE 802.16j Mobile Multi-Hop Relay WiMAX Network , 2014 .
[14] Mahmoud Naghshineh,et al. PARO: Supporting Dynamic Power Controlled Routing in Wireless Ad Hoc Networks , 2003, Wirel. Networks.
[15] Mehdi Khosrow-Pour. Cases on Telecommunications And Networking (Cases on Information Technology Series) (Cases on Information Technology Series) , 2006 .
[16] Ramjee Prasad,et al. Closed User Group Automotive Communication Network Based on Addressing at Physical Layer , 2012, Int. J. Interdiscip. Telecommun. Netw..
[17] Adrian Perrig,et al. Challenges in Securing Vehicular Networks , 2005 .
[18] Mario Gerla,et al. Adaptive Clustering for Mobile Wireless Networks , 1997, IEEE J. Sel. Areas Commun..
[19] Afifa Ghenai,et al. Hybrid Simulation Based Approach for Embedded Systems Reliability Analysis , 2013, Int. J. Embed. Real Time Commun. Syst..
[20] R. Poovendran,et al. CARAVAN: Providing Location Privacy for VANET , 2005 .
[21] Thomas Nowey,et al. Towards a security architecture for vehicular ad hoc networks , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[22] R. S. D. Wahida Banu,et al. A Novel Approach to Avoid Mobile Phone Accidents While Driving and Cost- Effective Fatalities , 2011, Int. J. Interdiscip. Telecommun. Netw..
[23] Baber Aslam,et al. Distributed certificate and application architecture for VANETs , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[24] Ronald C. Dodge,et al. Technology Education at the US Military Academy , 2005, IEEE Secur. Priv..
[25] Sung-Ju Lee,et al. Wireless Ad Hoc Multicast Routing with Mobility Prediction , 2001, Mob. Networks Appl..
[26] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[27] Adi Shamir,et al. How to share a secret , 1979, CACM.