1 |
P. Caballero-Gil, "Security Issues in Vehicular Ad Hoc Network," Mobile Ad-Hoc Networks : Applications, pp.67-88, 2011.
|
2 |
Meng-Yen Hsieh, Hua-i Lin, Chin-Feng Lai and Kuan-Ching Li, "Secure protocol for data propagation and group communication in vehicular networks," Journal on Wireless Communication and Networking, pp.1-16, 2011
|
3 |
P. Celka, N. J. Bershad, and J. M. Vesin, "Stochastic gradient identification of polynomial Wiener systems: Analysis and applicaion," IEEE Transactions on Signal Processing, vol. 49, issue 4, pp.301-313, 2001.
DOI
|
4 |
강상우, 박세진 "TPM의 Authenticated Boot를 활용한 VANET의 보안 향상 기법 설계," 한국컴퓨터종합학술대회 논문집, Vol.36, No.1(D), pp.216-222, 2009.
|
5 |
Douceur, J. "The Sybil Attack. In: First International Workshop on Peer-to-Peer Systems," March 2002, pp. 251-260 (2002)
|
6 |
Maxim Raya, Panos Papadimitrators, and Jean-Pierre Hubaux, "Securing Vehicular Communications," In Magazine of IEEE Wireless Communications - IVC Specials, EPFL, pp.8-15 Oct. 2006.
|
7 |
IEEE Computer Society, "IEEE Standard for Information technology - Telecommuni -cations and information exchange between systems- Local and metropolitan area networks - Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer(PHY) Specifications," 2007.07
|
8 |
S. Boeyen Entrust, T. Howes Netscape, P. Richard Xcert "Internet X.509 Public Key Infrastructure Operational Protocols- DAPv2," RFC 2559, IETF PKIX Working Group, April. 1999
|