Author:
Grover Jyoti,Kumar Deepak,Sargurunathan M.,Gaur M. S.,Laxmi Vijay
Publisher
Springer Berlin Heidelberg
Reference15 articles.
1. Raya, M., Papadimitratos, P., Hubaux, J.-P.: Secure vehicular communications. IEEE Wireless Communications Magazine, 8–15 (2006)
2. Raya, M., Hubaux, J.-P.: Securing vehicular ad hoc networks. Journal of Computer Security 15(1), 39–68 (2007)
3. Aijaz, A., Bochow, B., Dtzer, F., Festag, A., Gerlach, M., Kroh, R., Leinmuller, T.: Attacks on Inter-Vehicle Communication Systems - An Analysis. In: Proceedings of the 3rd International Workshop on Intelligent Transportation, WIT (March 2006)
4. Douceur, J.R.: The Sybil attack. In: Proceedings of the International Workshop on Peer to Peer Systems, pp. 251–260 (March 2002)
5. Piro, C., Shields, C., Levine, B.N.: Detecting the Sybil attack in mobile ad hoc network. In: International Conference on Security and Privacy in Communication Networks, pp. 1–11 (2006)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献