Secure, pseudonymous, and auditable communication in vehicular ad hoc networks
- 1 May 2008
- journal article
- research article
- Published by Wiley in Security and Communication Networks
- Vol. 1 (3), 233-244
- https://doi.org/10.1002/sec.27
Abstract
No abstract availableThis publication has 16 references indexed in Scilit:
- Privacy Issues in Vehicular Ad Hoc NetworksLecture Notes in Computer Science, 2006
- The security of vehicular ad hoc networksPublished by Association for Computing Machinery (ACM) ,2005
- Balancing auditability and privacy in vehicular networksPublished by Association for Computing Machinery (ACM) ,2005
- VITPPublished by Association for Computing Machinery (ACM) ,2005
- The feasibility of launching and detecting jamming attacks in wireless networksPublished by Association for Computing Machinery (ACM) ,2005
- ORBIT Measurements Framework and Library (OML): Motivations, Design, Implementation, and FeaturesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Overview of the ORBIT radio grid testbed for evaluation of next-generation wireless network protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- The security and privacy of smart vehiclesIEEE Security & Privacy, 2004
- Packet delay analysis of IEEE 802.11 MAC protocolElectronics Letters, 2003
- Digital signcryption or how to achieve cost(signature & encryption) ≪ cost(signature) + cost(encryption)Lecture Notes in Computer Science, 1997