Ximi Elga

EFFICIENT AND ROBUST PSEUDONYMOUS AUTHENTICATION IN VANET PDF

Effective and robust operations, as well as security and privacy are critical for the deployment of vehicular ad hoc networks (VANETs). Efficient and. (English)In: VANET’ PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL WORKSHOP ON VEHICULAR AD HOC NETWORKS. CiteSeerX – Document Details (Isaac Councill, Lee Giles, Pradeep Teregowda): Effective and robust operations, as well as security and privacy are critical for the .

Author: Migore Nibei
Country: Saint Kitts and Nevis
Language: English (Spanish)
Genre: Love
Published (Last): 6 July 2015
Pages: 268
PDF File Size: 9.17 Mb
ePub File Size: 17.99 Mb
ISBN: 263-4-64716-338-7
Downloads: 94375
Price: Free* [*Free Regsitration Required]
Uploader: Dozshura

Citation Statistics Citations 0 20 40 60 ’09 ’12 ’15 ‘ Other Papers By First Author. Markus Jakobsson 42 Estimated H-index: Anup Kumar Bhattacharya 1 Estimated H-index: Showing of extracted citations. Semantic Scholar estimates that this publication has citations based on the available data. Location privacy in emerging network-based applications.

Citations Publications citing this paper. Authentication Search for additional papers on this topic. Showing of 4 references. Bryan Parno 30 Estimated H-index: References Publications referenced by this paper.

  ECOLOGY OF THE HENGEYOKAI PDF

Efficient and easy-to-manage security and privacy-enhancing mechanisms are essential for the wide-spread adoption of the VANET technology. From This Authenticqtion Figures, tables, and topics from this paper.

Download PDF Cite this robkst. Brijesh Kumar Chaurasia 9 Estimated H-index: Ahren Studer 17 Estimated H-index: Hang Dok 2 Estimated H-index: Our proposal enables vehicle on-board units to generate their own pseudonyms, without affecting the system security.

CiteSeerX — Efficient and Robust Pseudonymous Authentication in VANET

Pssudonymous data handling Hoc programming language Software deployment. Krishna Sampigethaya 15 Estimated H-index: This paper has citations. Pseudonymous PKI for ubiquitous computing. We design mechanisms that reduce the security overhead for safety beaconing, and retain robustness for transportation safety, even in adverse network settings.

Efficient and robust pseudonymous authentication in VANET – Semantic Scholar

See our FAQ for additional information. Can We Rely on WiFi? Stealth attacks in vehicular technologies. Challenges authenticatio Securing Vehicular Networks. On the Performance of Secure Vehicular Communication Systems ieee transactions on dependable and secure computing.

  BIOGRAFI WS RENDRA PDF

Ke Zeng 1 Estimated H-index: This paper has highly influenced 28 other papers. Syverson 20 Estimated H-index: Im this paper, we are concerned with this problem; and in particular, how to achieve efficient and robust pseudonym-based authentication.

Group Principals and the Formalization of Anonymity. Efficient and easy-to-manage security and privacy-enhancing mechanisms are essential for the wide-spread adoption of the VANET technology.

Efficient and robust pseudonymous authentication in VANET

Michael Brown 4 Estimated H-index: In this paper, we are concerned with this problem; and in particular, how to achieve efficient and robust pseudonym-based authentication.

Loren Schwiebert 22 Estimated H-index: Skip to search form Skip to main content. Ref 28 Source Add To Collection.