Complementing public key infrastructure to secure vehicular ad hoc networks security and privacy in emerging wireless networks (English)
- New search for: Wasef, Albert
- New search for: Lu, Rongxing
- New search for: Lin, Xiaodong
- New search for: Shen, Xuemin
- New search for: Wasef, Albert
- New search for: Lu, Rongxing
- New search for: Lin, Xiaodong
- New search for: Shen, Xuemin
In:
IEEE Wireless Communications
;
17
, 5
;
22-28
;
2010
-
ISSN:
- Article (Journal) / Print
-
Title:Complementing public key infrastructure to secure vehicular ad hoc networks security and privacy in emerging wireless networks
-
Contributors:Wasef, Albert ( author ) / Lu, Rongxing ( author ) / Lin, Xiaodong ( author ) / Shen, Xuemin ( author )
-
Published in:IEEE Wireless Communications ; 17, 5 ; 22-28
-
Publisher:
-
Publication date:2010
-
Size:7 Seiten, 10 Quellen
-
ISSN:
-
Coden:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 17, Issue 5
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Table of contents| 2010
- 2
-
Dynamic spectrum management: the technology harvesting the underutilized spectrum resource [Message from the Editor-in-Chief]Fang, Yuguang Michael et al. | 2010
- 2
-
EDITOR'S NOTE| 2010
- 4
-
INDUSTRY PERSPECTIVE/FUTURE MOBILE INFRASTRUCTURE| 2010
- 4
-
The future mobile infrastructure: challenges and opportunities [Industry Perspectives]Bonomi, Flavio et al. | 2010
- 6
-
Femtocells [Industry Perspectives]Patel, Chirag / Yavuz, Mehmet / Nanda, Sanjiv et al. | 2010
- 6
-
INDUSTRY PERSPECTIVE/FEMTOCELLS| 2010
- 8
-
Scanning the literatureZhang, Yanchao et al. | 2010
- 10
-
Security and privacy in emerging wireless networks [Guest Editorial]Cao, Guohong / Hubaux, Jean-Pierre / Kim, Yongdae / Zhang, Yanchao et al. | 2010
- 12
-
Security and privacy in emerging wireless networks [Invited Paper]D Ma, / Tsudik, G et al. | 2010
- 12
-
SECURITY AND PRIVACY IN EMERGING WIRELESS NETWORKSMa, Di et al. | 2010
- 22
-
COMPLEMENTING PUBLIC KEY INFRASTRUCTURE TO SECURE VEHICULAR AD HOC NETWORKSWasef, Albert et al. | 2010
- 22
-
Complementing public key infrastructure to secure vehicular ad hoc networks [Security and Privacy in Emerging Wireless Networks]Wasef, Albert / Rongxing Lu, / Xiaodong Lin, / Xuemin Shen, et al. | 2010
- 30
-
LOCATION PRIVACY IN URBAN SENSING NETWORKS: RESEARCH CHALLENGES AND DIRECTIONSKrontiris, Ioannis et al. | 2010
- 30
-
Location privacy in urban sensing networks: research challenges and directions [Security and Privacy in Emerging Wireless Networks]Krontiris, Ioannis / Freiling, Felix C / Dimitriou, Tassos et al. | 2010
- 36
-
DETECTING WORMHOLE ATTACKS IN DELAY-TOLERANT NETWORKSRen, Yanzhi et al. | 2010
- 36
-
Detecting wormhole attacks in delay-tolerant networks [Security and Privacy in Emerging Wireless Networks]Yanzhi Ren, / Mooi Choo Chuah, / Jie Yang, / Yingying Chen, et al. | 2010
- 44
-
Application of wireless sensor networks in critical infrastructure protection: challenges and design options [Security and Privacy in Emerging Wireless Networks]Buttyan, L / Gessner, D / Hessler, A / Langendoerfer, P et al. | 2010
- 44
-
APPLICATION OF WIRELESS SENSOR NETWORKS IN CRITICAL INFRASTRUCTURE PROTECTION: CHALLENGES AND DESIGN OPTIONSButtyán, Levente et al. | 2010
- 50
-
Protocols for stimulating packet forwarding in wireless ad hoc networks [Security and Privacy in Emerging Wireless Networks]Chengqi Song, / Qian Zhang, et al. | 2010
- 50
-
PROTOCOLS FOR STIMULATING PACKET FORWARDING IN WIRELESS AD HOC NETWORKSSong, Chengqi et al. | 2010
- 56
-
NON-CRYPTOGRAPHIC AUTHENTICATION AND IDENTIFICATION IN WIRELESS NETWORKSZeng, Kai et al. | 2010
- 56
-
Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks]Kai Zeng, / Govindan, K / Mohapatra, P et al. | 2010
- 63
-
EXPLOITING THE PHYSICAL LAYER FOR ENHANCED SECURITYMathur, Suhas et al. | 2010
- 63
-
Exploiting the physical layer for enhanced security [Security and Privacy in Emerging Wireless Networks]Mathur, Suhas / Reznik, Alex / Chunxuan Ye, / Mukherjee, Rajat / Rahman, Akbar / Shah, Yogendra / Trappe, Wade / Mandayam, Narayan et al. | 2010
- 71
-
Survivability strategies in multihop wireless networks [Accepted From Open Call]Al-Kofahi, Osameh M / Kamal, A E et al. | 2010
- 71
-
ACCEPTED FROM OPEN CALL SURVIVABILITY STRATEGIES IN MULTIHOP WIRELESS NETWORKSAl-Kofahi, Osameh M et al. | 2010
- 81
-
A server-in-the-middle approach for enabling mobile devices to discover and invoke web service methods on demand [Accepted From Open Call]Artail, H / Safa, H / Abdel-Samad, Rawia / Ezzedine, I / Abou-Faraj, Omar et al. | 2010
- 81
-
A SERVER-IN-THE-MIDDLE APPROACH FOR ENABLING MOBILE DEVICES TO DISCOVER AND INVOKE WEB SERVICE METHODS ON DEMANDArtail, Hassan et al. | 2010
- c1
-
IEEE Wireless Communcations| 2010