Effective and robust operations, as well as security and privacy are critical for the deployment of vehicular ad hoc networks (VANETs). Efficient and. (English)In: VANET’ PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL WORKSHOP ON VEHICULAR AD HOC NETWORKS. CiteSeerX – Document Details (Isaac Councill, Lee Giles, Pradeep Teregowda): Effective and robust operations, as well as security and privacy are critical for the .
|Country:||Saint Kitts and Nevis|
|Published (Last):||6 July 2015|
|PDF File Size:||9.17 Mb|
|ePub File Size:||17.99 Mb|
|Price:||Free* [*Free Regsitration Required]|
Citation Statistics Citations 0 20 40 60 ’09 ’12 ’15 ‘ Other Papers By First Author. Markus Jakobsson 42 Estimated H-index: Anup Kumar Bhattacharya 1 Estimated H-index: Showing of extracted citations. Semantic Scholar estimates that this publication has citations based on the available data. Location privacy in emerging network-based applications.
Citations Publications citing this paper. Authentication Search for additional papers on this topic. Showing of 4 references. Bryan Parno 30 Estimated H-index: References Publications referenced by this paper.
Efficient and easy-to-manage security and privacy-enhancing mechanisms are essential for the wide-spread adoption of the VANET technology. From This Authenticqtion Figures, tables, and topics from this paper.
Download PDF Cite this robkst. Brijesh Kumar Chaurasia 9 Estimated H-index: Ahren Studer 17 Estimated H-index: Hang Dok 2 Estimated H-index: Our proposal enables vehicle on-board units to generate their own pseudonyms, without affecting the system security.
CiteSeerX — Efficient and Robust Pseudonymous Authentication in VANET
Pssudonymous data handling Hoc programming language Software deployment. Krishna Sampigethaya 15 Estimated H-index: This paper has citations. Pseudonymous PKI for ubiquitous computing. We design mechanisms that reduce the security overhead for safety beaconing, and retain robustness for transportation safety, even in adverse network settings.
Efficient and robust pseudonymous authentication in VANET – Semantic Scholar
See our FAQ for additional information. Can We Rely on WiFi? Stealth attacks in vehicular technologies. Challenges authenticatio Securing Vehicular Networks. On the Performance of Secure Vehicular Communication Systems ieee transactions on dependable and secure computing.
Ke Zeng 1 Estimated H-index: This paper has highly influenced 28 other papers. Syverson 20 Estimated H-index: Im this paper, we are concerned with this problem; and in particular, how to achieve efficient and robust pseudonym-based authentication.
Group Principals and the Formalization of Anonymity. Efficient and easy-to-manage security and privacy-enhancing mechanisms are essential for the wide-spread adoption of the VANET technology.
Efficient and robust pseudonymous authentication in VANET
Michael Brown 4 Estimated H-index: In this paper, we are concerned with this problem; and in particular, how to achieve efficient and robust pseudonym-based authentication.
Loren Schwiebert 22 Estimated H-index: Skip to search form Skip to main content. Ref 28 Source Add To Collection.