|
[1] A. Aijaz, B. Bochow, F. Dotzer and A. Festag, “Attacks on Inter Vehicle Communication Systems - an Analysis,” The 3rd International Workshop on Intelligent Transportation (WIT 2006), 2006.
[2] F. Armknecht, A. Festag, D. Westhoff and K. Zeng, “Cross-Layer Privacy Enhancement and Non-Repudiation in Vehicular Communication,” The 4th Workshop on Mobile Ad-Hoc Networks (WMAN), Bern Switzerland, March 2007.
[3] J. Y. Choi, M. Jakobsson and S. Wetzel, “Balancing Auditability and Privacy in Vehicular Networks,” The 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks, pp. 79-87, 2005.
[4] M. C. Chuang and J. F. Lee, “LMAM: A Lightweight Mutual Authentication Mechanism for Network Mobility in Vehicular Networks,” 2008 IEEE Asia-Pacific Services Computing Conference (APSCC 2008), pp. 1611-1616, 2008.
[5] C. C. Chang, C. Y. Lee and Y. C. Chiu, “Enhanced Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks,” Computer Communications, Volume 32, no. 4, pp. 611-618, 2009.
[6] H. Chen, A. Perrig and D. Song, “Random Key Predistribution Scheme for Sensor Networks,” IEEE Symp. Security and Privacy (S&P’ 03), pp. 197-213, 2003.
[7] G. Calandriello, P. Papadimitratos, J. P. Hubaux and A. Lioy, “Efficient and Robust Pseudonymous Authentication in VANET,” The fourth ACM International Workshop on Vehicular Ad hoc Networks, pp. 19-28, 2007.
[8] S. Duri, M. Gruteser, X. Liu, P. Moskowitz, R. Perez, M. Singh and J. M. Tang, “Framework for Security and Privacy in Automotive Telemetries,” The 2nd ACM International Workshop on Mobile Commerce, pp. 25-32, 2002.
[9] M. Elzarki, S. Mehrotra, G. Tsudik and N. Venkatasubramanian, “Security Issues in A Future Vehicular Network,” The European Wireless Conference (EuroWireless '02), 2002.
[10] E. Fonseca, A. Festag, R. Baldessari and R. L. Aguiar, “Support of Anonymity in VANETs – Putting Pseudonymity into Practice,” IEEE Wireless Communications and Networking Conference, pp. 11-15, 2007.
[11] M. Gerlach, A. Festag, T. Leinmller, G. Goldacker and C. Harsch, “Security Architecture for Vehicular Communication,” In WIT 2005.
[12] M. Gerlach and F. Guttler, “Privacy in VANETs using Changing Pseudonyms - Ideal and Real,” The 65th Vehicular Technology Conference (VTC2007), pp. 2521-2525, 2007. [13] J. P. Hubaux, S. Capkun and J. Luo, “The Security and Privacy of Smart Vehicles,” IEEE Security and Privacy Magazine, Volume 2, Issue 3, pp. 49-55, 2005.
[14] Y. X. Jiang, C. Lin, X. M. Shen and M. G. Shi, “Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks,” IEEE Transactions on Wireless Communications, Volume 5, Issue 9, pp. 2569-2577, 2006.
[15] S. H. Kim, B. H. Kim, Y. K. Kim and D. H. Lee, “Auditable and Privacy-Preserving Authentication in Vehicular Networks,” The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM'08), pp. 19-24, 2008.
[16] J. Luo and J. P. Hubaux, “A Survey of Inter-Vehicle Communication,” EPFL Technical Report IC, 2004.
[17] N. W. Lo and H. C. Tsai, “Illusion Attack on VANET Applications – A Message Plausibility Problem,” Dept. of Information Management, NTUST, Technical Report, 2007.
[18] D. Liu and P. Neng, “Establishing Pair-wise Keys in Distributed Sensor Networks,” The 10th ACM Conference on Computer and Communications Security (CCS), pp. 52-61, 2003.
[19] P. Papadimitratos, L. Buttyan, J. P. Hubaux, F. Kargl, A. Kung and M. Raya, “Architecture for Secure and Private Vehicular Communications,” The 7th International Conference on ITS Telecommunications, pp. 1-6, 2007
[20] P. Papadimitratos, A. King, J. P. Hubaux and F. Kargl, “Privacy and Identity Management for Vehicular Communication Systems: a Position Paper,” Workshop on Standards for Privacy in User-Centric Identity Management, 2006.
[21] K. Plobl, T. Nowey and C. Mletzko, “Towards a Security Architecture for Vehicular Ad Hoc Networks,” The First International Conference on Availability, Reliability and Security (ARES' 06), 2006.
[22] B. Parno and A. Perrig, “Challenges in Securing Vehicular Networks,” Workshop on Hot Topics in Networks (HotNets-IV), 2005.
[23] M. Raya and J. P. Hubaux, “The Security of Vehicular Ad hoc Networks,” The 3rd ACM Workshop on Security of Ad hoc and Sensor Networks, pp. 11-21, 2005.
[24] M. Raya and J. P. Hubaux, “Securing Vehicular Ad hoc Networks,” Journal of Computer Security, Volume 15, Issue 1, pp. 39-68, 2007.
[25] M. Raya and J. P. Hubaux, “Efficient Secure Aggregation in VANETs,” The 3rd International Workshop on Vehicular Ad hoc Networks, pp. 67-75, 2006.
[26] X. T. Sun, X-D. Lin and P. H. Ho, “Secure Vehicular Communications Based on Group Signature and Id-based Signature Scheme,” IEEE International Conference on Communications (ICC '07), pp. 1539-1545, 2007. [27] Z. Wan, K. Ren and B. Preneel, “A Secure Privacy-preserving Roaming Protocol Based on Hierarchical Identity-based Encryption for Mobile Networks,” The first ACM Conference on Wireless Network Security, pp. 62-67, 2008.
[28] Q. Xu, T. Mak, J. Ko and R. Sengupta, “Vehicle-to-Vehicle Safety Messaging in DSRC,” The first ACM Workshop on Vehicular Ad hoc Networks, pp. 19-28, 2004.
[29] Y. Xi, K. Sha, W. Shi, L. Schwiebert and T. Zhang, “Enforcing Privacy using Symmetric Random Key-set in Vehicular Networks,” International Symposium on Autonomous Decentralized Systems (ISADS '07), pp. 344-351, 2007.
[30] B. Xiao, B. Yu, and C. Gao, “Detection and Localization of Sybil Nodes in VANETs,” The 2006 Workshop on Dependability Issues in Wireless Ad hoc Networks and Sensor Networks, pp. 1-8, 2006.
[31] G. M. Yang, S. Wong and X. T. Deng , “Anonymous and Authenticated Key Exchange for Roaming Networks,” IEEE Transactions on Wireless Communications, Volume 6, no. 9, pp. 3461-3472, 2007
[32] C. Zhang, R. X. Liu, P. H. Ho, and A. Chen, “A Location Privacy Preserving Authentication Scheme in Vehicular Networks,” IEEE Wireless Communications and Networking Conference, pp. 2543-2548, 2008.
[33] C. Zhang, R. Lu, X. D. Lin, P. H. Ho and X. M. Shen, “An Efficient Identity-based Batch Verification Scheme for Vehicular Sensor Networks,” The 27th IEEE Conference on Computer Communications, pp. 246-250, 2008.
[34] Now:Network on wheels, http://www.network-on-wheels.de/
|