Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] P. Papadimitratos, A. Kung, J. P. Hubaux, and F. Kargl, “Privacy and identity management for vehicular communication systems: a position paper,†Proc. Workshop on Standards for Privacy in UserCentric Identity Management, Zurich, Switzerland, July 2006. [2] K. Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K. Sezaki, “CARAVAN: Providing location privacy for VANET,†Proc. Embedded Security in Cars (ESCAR), November 2005. [3] A. Wasef, Y. Jiang, and X. Shen, “DCS: An efficient distributed certificate service scheme for vehicular networks,†IEEE Trans. on Vehicular Technology, vol. 59, pp. 533–549, 2010. [4] M. Raya and J.-P. Hubaux, “Securing vehicular ad hoc networks,†Journal of Computer Security, vol. 15, no. 1, pp. 39–68, 2007. [5] “US bureau of transit statistics.†*Online+. Available: http://en.wikipedia.org/wiki/Passenger vehicles in the United States [6] J. J. Haas, Y. Hu, and K. P. Laberteaux, “Design and analysis of a lightweight certificate revocation mechanism for VANET,†Proc. 6th ACM international workshop on VehiculAr InterNETworking, pp. 89–98, 2009. [7] “IEEE trial-use standard for wireless access in vehicular environments - security services for applications and management messages,†IEEE Std 1609.2-2006, 2006. [8] “5.9 GHz DSRC.†*Online+. Available: http://grouper.ieee.org/groups/scc32/dsrc/index.html. [9]A. Wasef and X. Shen, “MAAC: Message authentication acceleration protocol for vehicular ad hoc networks,†Proc. IEEE GLOBECOM’09, 2009. [10] J. P. Hubaux, “The security and privacy of smart vehicles,†IEEE Security and Privacy, vol. 2, pp. 49–55, 2004. [11] A. Studer, E. Shi, F. Bai, and A. Perrig, “TACKing together efficient authentication, revocation, and privacy in VANETs,†Proc. SECON ’09, pp. 1–9, 2009. [12] M. Raya, P. Papadimitratos, I. Aad, D. Jungels, and J.-P. Hubaux, “Eviction of misbehaving and faulty nodes in vehicular networks,†IEEE Journal on Selected Areas in Communications, vol. 25, pp. 1557– 1568, 2007. [13] P. P. Papadimitratos, G. Mezzour, and J. Hubaux, “Certificate revocation list distribution in vehicular communication systems,†Proc. 5th ACM international workshop on VehiculAr InterNETworking, pp. 86–87, 2008. [14] K. P. Laberteaux, J. J. Haas, and Y. Hu, “Security certificate revocation list distribution for VANET,†Proc. 5th ACM international workshop on VehiculAr Inter-NETworking, pp. 88–89, 2008. [15] H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes for sensor networks,†Proc. 2003 IEEE Symposium on Security and Privacy, pp. 197–213, 2003.
V1I415.pdf |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|