참고문헌
- Olariu, Stephan, Ismail Khalil, and Mahmoud Abuelela, "Taking VANET to the clouds," International Journal of Pervasive Computing and Communications, Vol.7, No.1, pp.7-21, 2011. https://doi.org/10.1108/17427371111123577
- El Zarki, Magda, et al., "Security issues in a future vehicular network," European Wireless, Vol.2, 2002.
- Armbrust, Michael, et al., "A view of cloud computing," Communications of the ACM, Vol.53, No.4, pp.50-58, 2010.
- Olariu, Stephan, Tihomir Hristov, and Gongjun Yan, "The next paradigm shift: from vehicular networks to vehicular clouds," Basagni, S., Conti, M., and Giordano, S. Stojmenovic, I) (Eds), "Mobile Ad hoc networking: the cutting edge directions," Wiley and Sons, New York, 2012.
- Hussain, Rasheed, et al., "Rethinking vehicular communications: merging VANET with cloud computing," Cloud Computing Technology and Science (CloudCom), 2012 IEEE 4th International Conference on. IEEE, 2012.
- Popek, Gerald J., Robert P. Goldberg, "Formal requirements for virtualizable third generation architectures," Communications of the ACM, Vol.17, No.7, pp.412-421, 1974. https://doi.org/10.1145/361011.361073
- Su, William, Sung-Ju Lee, and Mario Gerla, "Mobility prediction and routing in ad hoc wireless networks," International Journal of Network Management, Vol.11, No.1, pp.3-30, 2001. https://doi.org/10.1002/nem.386
- Noureddine, Hadi, et al., "A New Link Lifetime Prediction Method for Greedy and Contention-based Routing in Mobile Ad Hoc Networks," Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on. IEEE, 2010.
- Rivest, Ronald L., Adi Shamir, and Len Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, Vol.21, No.2, pp.120-126, 1978. https://doi.org/10.1145/359340.359342
- Rowland, Craig H., "Intrusion detection system," U.S. Patent, No.6, 405,318., 11 Jun., 2002.
- Modi, Chirag, et al., "A survey of intrusion detection techniques in cloud," Journal of Network and Computer Applications, Vol.36, No.1, pp.42-57, 2013. https://doi.org/10.1016/j.jnca.2012.05.003
- Qiao, Yan, et al., "Anomaly intrusion detection method based on HMM," Electronics Letters, Vol.38, No.13, pp.663-664, 2002. https://doi.org/10.1049/el:20020467
- Chaum, David, and Eugene Van Heyst, "Group signatures," Advances in Cryptology-EUROCRYPT'91. Springer Berlin Heidelberg, 1991.
- Guo, Jinhua, John P. Baugh, and Shengquan Wang, "A group signature based secure and privacy-preserving vehicular communication framework," Mobile Networking for Vehicular Environments 2007, pp.103-108, 2007.