최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기IEEE transactions on vehicular technology, v.58 no.9, 2009년, pp.5214 - 5224
Wasef, A. (Dept. of Electr.&Comput. Eng., Univ. of Waterloo, Waterloo, ON, Canada) , Xuemin Shen (Dept. of Electr.&Comput. Eng., Univ. of Waterloo, Waterloo, ON, Canada)
It is well recognized that security is vital for the reliable operation of vehicular ad hoc networks (VANETs). One of the critical security issues is the revocation of misbehaving vehicles, which is essential for the prevention of malicious vehicles from jeopardizing the safety of other vehicles. In...
IEIC Tech Rep new explicit conditions of elliptic curve traces for fr-reductions miyaji 2000 100 99
Traffic and Network Simulation EnvironmentTraNS 0
Johnson, Don, Menezes, Alfred, Vanstone, Scott. The Elliptic Curve Digital Signature Algorithm (ECDSA). International Journal of Information Security : IJIS, vol.1, no.1, 36-63.
Xiaodong Lin, Xiaoting Sun, Pin-Han Ho, Xuemin Shen. GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications. IEEE transactions on vehicular technology, vol.56, no.6, 3442-3456.
Proc IEEE Symp Security Privacy random key predistribution schemes for sensor networks chan 2003 197
Proc 11th IEEE Int Conf Netw Protocols establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach zhu 2003 326
J Comput Secur gkmpan: an efficient group rekeying scheme for secure multicast in ad-hoc networks zhu 2006 10.3233/JCS-2006-14401 14 301
Shamir, Adi. How to share a secret. Communications of the ACM, vol.22, no.11, 612-613.
IEEE Trial-Use Standard for Wireless Access in Vehicular EnvironmentsSecurity Services for Applications and Management Messages 2006
The Network Simulatorns-2 0
Proc 1st ACM Workshop Veh Ad-hoc Netw privacy issues in vehicular ad hoc networks dtzer 2006 197
Raya, M., Papadimitratos, P., Aad, I., Jungels, D., Hubaux, J.-P.. Eviction of Misbehaving and Faulty Nodes in Vehicular Networks. IEEE journal on selected areas in communications : a publication of the IEEE Communications Society, vol.25, no.8, 1557-1568.
Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology identity-based encryption from the weil pairing boneh 2001 213
Certificate revocation in vehicular networks raya 2006
Topics in Cryptology scott 2005 293
Boneh, Dan, Lynn, Ben, Shacham, Hovav. Short Signatures from the Weil Pairing. Journal of cryptology : the journal of the International Association for Cryptologic Research, vol.17, no.4, 297-319.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
저자가 공개 리포지터리에 출판본, post-print, 또는 pre-print를 셀프 아카이빙 하여 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.