Author:
Kong Hee-Kyung,Hong Myoung Ki,Kim Tae-Sung
Funder
National Research Foundation of Korea
Publisher
Springer Science and Business Media LLC
Reference48 articles.
1. Bernardo DV, Hoang DB (2012) Multi-layer security analysis and experimentation of high speed protocol data transfer for GRID. Int J Grid Util Comput 3(2–3):81–88
2. Bharadiya B, Maity N, Hansdahs RC (2014) An authentication protocol for vehicular ad hoc networks with heterogeneous anonymity requirements. Int J Space-Based Situat Comput 4(1):1–14
3. Brooks RR, Sander S, Deng J, Taiber J (2009) Automobile security concerns. IEEE Veh Technol Mag 4(2):52–64
4. Cha BR, Kim JW (2013) Handling and analysis of fake multimedia contents threats with collective intelligence in P2P file sharing environments. Int J Grid Util Comput 4(1):1–9
5. Checkoway S, McCoy D, Kantor B, Anderson D, Shacham H, Savage S, Kohno T (2011) Comprehensive experimental analyses of automotive attack surfaces. In: Proceedings of the USENIX security symposium; 8–12 August, San Francisco, pp 77–92
Cited by
44 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献