共 50 条
- [1] Secure Data Sharing for Vehicular Ad-hoc Networks Using Cloud Computing [J]. AD HOC NETWORKS, ADHOCNETS 2016, 2017, 184 : 306 - 315
- [2] Secure Communication and Implementation Technique for Sybil Attack in Vehicular Ad-Hoc Networks [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2018), 2018, : 539 - 543
- [3] Secure Location Verification for Vehicular Ad-Hoc Networks [J]. GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
- [4] Toward Secure Vehicular Ad-hoc Networks: A Survey [J]. IETE TECHNICAL REVIEW, 2012, 29 (01) : 80 - 89
- [5] An Efficient Anonymous Authentication Scheme with Secure Communication in Intelligent Vehicular Ad-hoc Networks [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (06): : 3280 - 3298
- [6] Pseudo-identity Based Secure Communication Scheme for Vehicular Ad-hoc Networks [J]. 13TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATION SYSTEMS (IEEE ANTS), 2019,
- [7] Visible Light Communication in Vehicular Ad-Hoc Networks [J]. 2016 24TH SIGNAL PROCESSING AND COMMUNICATION APPLICATION CONFERENCE (SIU), 2016, : 881 - 884
- [8] Using TPMs to secure Vehicular Ad-hoc Networks (VANETs) [J]. INFORMATION SECURITY THEORY AND PRACTICES: SMART DEVICES, CONVERGENCE AND NEXT GENERATION NETWORKS, 2008, 5019 : 106 - 116
- [9] Secure and Revocable Node Authentication in Vehicular Ad-Hoc Networks [J]. 2013 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2013,