1 |
D. Valerio, A. D'Alconzo, F. Ricciato, and W. Wiedermann, "Exploiting Cellular Networks for Road Traffic Estimation: A Survey and a Research Roadmap," VTC Spring 2009 - IEEE 69th Vehicular Technology Conference, pp. 1-5, Apr. 2009.
|
2 |
H. Bar-Gera, "Evaluation of a cellular phone-based system for measurements of traffic speeds and travel times: A case study from Israel," Transportation Research Part C: Emerging Technologies, vol. 15, no. 6, pp. 380-391, Dec. 2007.
DOI
ScienceOn
|
3 |
M. Fontaine, B. Smith, A. Hendricks, and W. Scherer, "Wireless Location Technology-Based Traffic Monitoring: Preliminary Recommendations to Transportation Agencies Based on Synthesis of Experience and Simulation Results," Transportation Research Record, vol. 1993, no. 1, pp. 51-58, Jan. 2007.
DOI
|
4 |
"Law of DSA", vol. 10008, 2010.
|
5 |
"Technology of certificate storage and usage ", KISA, 2010.
|
6 |
Elaine Barker, William Barker, William Burr, William Polk, Miles Smid, "Recommendation for Key Management Part 1: General(Revised)", SP 800-57, NIST, March 2007.
|
7 |
Elaine Barker, Allen Roginsky, "Transitions:Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths", SP 800-131A, NIST, January 2011.
|
8 |
L. Zhang, Q. Wu, A. Solanas, and J. Domingo-Ferrer, "A Scalable Robust Authentication Protocol for Secure Vehicular Communications," IEEE Transactions on Vehicular Technology, Vol. 59, No. 4, pp. 1606-1617, May. 2010.
DOI
ScienceOn
|
9 |
"ISO 18013-1, Information technology-Personal identification-ISO-compliant driving licence-Part 1: Physical characteristics and basic data set," ISO, 2005.
|
10 |
"ISO 18013-2, Information technology-Personal identification-ISO-compliant driving licence-Part 2: Machine-readable technologies," ISO, 2007.
|
11 |
"ISO 18013-3: Information technology-Personal identification-ISO-compliant driving licence-Part 3:Access control, authentication and integrity validation," ISO, 2006.
|
12 |
Vasileios Manolopoulos, "Security and privacy in smartphone based intelligent transportation systems," Royal institute of technology, 2012.
|
13 |
"White Paper: How TomToms HDTraffic And IQRoutes Data Provides The Very Best Routing." [Online]. Available: http://www.tomtom.com/lib/doc/download/HDT_White_Paper.pdf. [Accessed: 25-Apr-2012].
|
14 |
D. Work and A. Bayen, "Impacts of the mobile internet on transportation cyber-physical systems: Traffic monitoring using smartphones," in National Workshop for Research on High-Confidence Transportation Cyber-Physical Systems: Automotive, Aviation, & Rail, pp. 18-20. 2008.
|
15 |
"Ford Sync." [Online]. Available:http://www.ford.com/technology/sync/. [Accessed: 25-Apr-2012].
|
16 |
"BMW Connected." [Online]. Available:http://www.bmw.com/com/en/owners/bmw_apps/app_bmw_connected.html. [Accessed: 25-Apr-2012].
|
17 |
"ITU Key Global Telecom Indicators for the World Telecommunication Service Sector." [Online]. Available: http://www.itu.int/ITUD/ict/statistics/at_glance/KeyTelecom.html. [Accessed: 25-Apr-2012].
|
18 |
Y. Yim, "The state of cellular probes," 2003. [Online]. Available:http://escholarship.org/uc/item/8g90p0vw.pdf. [Accessed: 11-Apr-2012].
|
19 |
Youngjun Cho, Hyunseung Lee, Namje Park, Dooho Choi, Dongho Won, Seungjoo Kim, "Security Trend of VANET Security," KIISC, Vol. 19, No. 1, pp. 134-142, 2009.
|
20 |
H. Hartenstein and K. P. Laberteaux, "A Tutorial Survey on Vehicular Ad Hoc Networks," IEEE Communications Magazine, vol. 46, no. 6, pp. 164-171, Jun. 2008.
|
21 |
Y. Toor, P. Muhlethaler, A. Laouiti, and A. Fortelle, "Vehicular ad hoc networks: Applications and related technical issues," IEEE Communication Survey & Tutorial, vol. 10, no. 3, pp. 74-88, 2008.
DOI
|
22 |
JongTaek Oh, "5.9GHz DSRC Frequency Standard of America," TTA Journal, vol. 98, pp. 122-132, 2005.
|
23 |
M. Raya and J. P. Hubaux, "Securing Vehicular Ad hoc Networks," Journal of Computer Security, Vol. 15, No. 1, pp. 39-68, Jan. 2007.
|
24 |
X. Lin, X. Sun, P.-H. Ho, and X. Shen, "GSIS: A Secure and Privacy Preserving Protocol for Vehicular Communications," IEEE Transaction on Vehicular Technology, Vol. 56, No. 6, pp. 3442-3456. Nov. 2007.
DOI
ScienceOn
|
25 |
R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, "ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications," Proceedings IEEE INFOCOM, pp. 1903-1911, Apr. 2008.
|
26 |
C. Zhang, X. Lin, R. Lu, and P. Ho, "RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks," IEEE International Conference on Communications, art. no. 4533317, pp. 1451-1457, May. 2008.
|
27 |
C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. Shen, "An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks," Proceedings IEEE INFOCOM, pp. 816-824, Apr. 2008.
|
28 |
A. Ferrara, M. Green, S. Hohenberger, and M. Pedersen, "Practical Short Signature Batch Verification," Proceedings of CT-RSA, Lecture Notes in Computer Science, Vol. 5473, pp. 309-324, Apr. 2009.
|