Journal articles on the topic 'Securing Vehicular'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Securing Vehicular.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Raya, Maxim, Panos Papadimitratos, and Jean-pierre Hubaux. "SECURING VEHICULAR COMMUNICATIONS." IEEE Wireless Communications 13, no. 5 (2006): 8–15. http://dx.doi.org/10.1109/wc-m.2006.250352.
Full textFernandez, Pedro J., Jose Santa, Fernando Bernal, and Antonio F. Skarmeta. "Securing Vehicular IPv6 Communications." IEEE Transactions on Dependable and Secure Computing 13, no. 1 (2016): 46–58. http://dx.doi.org/10.1109/tdsc.2015.2399300.
Full textMoussaoui, Djilali, Mohamed Feham, Boucif Amar Bensaber, and Benamar Kadri. "Securing vehicular cloud networks." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (2019): 4154. http://dx.doi.org/10.11591/ijece.v9i5.pp4154-4162.
Full textRaya, Maxim, and Jean-Pierre Hubaux. "Securing vehicular ad hoc networks." Journal of Computer Security 15, no. 1 (2007): 39–68. http://dx.doi.org/10.3233/jcs-2007-15103.
Full textSaez, Y., X. Cao, L. B. Kish, and G. Pesti. "Securing Vehicle Communication Systems by the KLJN Key Exchange Protocol." Fluctuation and Noise Letters 13, no. 03 (2014): 1450020. http://dx.doi.org/10.1142/s0219477514500205.
Full textMei, Fang, Shengjie Liu, Jian Wang, Yuming Ge, and Tie Feng. "Negotiation-Free Encryption for Securing Vehicular Unicasting Communication." Applied Sciences 9, no. 6 (2019): 1121. http://dx.doi.org/10.3390/app9061121.
Full textTrouli, Georgia-Irene, and George Kornaros. "Automotive Virtual In-sensor Analytics for Securing Vehicular Communication." IEEE Design & Test 37, no. 3 (2020): 91–98. http://dx.doi.org/10.1109/mdat.2020.2974914.
Full textRathee, Sharma, Iqbal, Aloqaily, Jaglan, and Kumar. "A Blockchain Framework for Securing Connected and Autonomous Vehicles." Sensors 19, no. 14 (2019): 3165. http://dx.doi.org/10.3390/s19143165.
Full textShrestha, Rakesh, Seung Yeob Nam, Rojeena Bajracharya, and Shiho Kim. "Evolution of V2X Communication and Integration of Blockchain for Security Enhancements." Electronics 9, no. 9 (2020): 1338. http://dx.doi.org/10.3390/electronics9091338.
Full textLee, Jong-Hyouk, Jiefeng (Terence) Chen, and Thierry Ernst. "Securing mobile network prefix provisioning for NEMO based vehicular networks." Mathematical and Computer Modelling 55, no. 1-2 (2012): 170–87. http://dx.doi.org/10.1016/j.mcm.2011.02.023.
Full textTolba, Amr, and Ayman Altameem. "A Three-Tier Architecture for Securing IoV Communications Using Vehicular Dependencies." IEEE Access 7 (2019): 61331–41. http://dx.doi.org/10.1109/access.2019.2903597.
Full textChen, Chin-Ling, Jungpil Shin, Yu-Ting Tsai, Aniello Castiglione, and Francesco Palmieri. "Securing Information Exchange in VANETs by Using Pairing-Based Cryptography." International Journal of Foundations of Computer Science 28, no. 06 (2017): 781–97. http://dx.doi.org/10.1142/s0129054117400184.
Full textAl-Qaraghuli, Mohammed, Saadaldeen Ahmed, and Muhammad Ilyas. "Encrypted Vehicular Communication Using Wireless Controller Area Network." 3D SCEEER Conference sceeer, no. 3d (2019): 17–24. http://dx.doi.org/10.37917/ijeee.sceeer.3rd.3.
Full textRUAN, Na, Chunhua SU, and Chi XIE. "Securing Cooperative Adaptive Cruise Control in Vehicular Platoons via Cooperative Message Authentication." IEICE Transactions on Information and Systems E103.D, no. 2 (2020): 256–64. http://dx.doi.org/10.1587/transinf.2019inp0010.
Full textSharma, Rajesh, and Ankur Goyal. "Securing Vehicular Ad-hoc Network by Two Stage Attacked Node Identification Algorithm." International Journal of Computer Sciences and Engineering 7, no. 5 (2019): 1004–8. http://dx.doi.org/10.26438/ijcse/v7i5.10041008.
Full textGiannopoulos, Hristos, Alexander M. Wyglinski, and Joseph Chapman. "Securing Vehicular Controller Area Networks: An Approach to Active Bus-Level Countermeasures." IEEE Vehicular Technology Magazine 12, no. 4 (2017): 60–68. http://dx.doi.org/10.1109/mvt.2017.2647814.
Full textGopi, R., and A. Rajesh. "Securing video cloud storage by ERBAC mechanisms in 5g enabled vehicular networks." Cluster Computing 20, no. 4 (2017): 3489–97. http://dx.doi.org/10.1007/s10586-017-0987-0.
Full textPremkumar, K., and R. Baskaran. "The Data Dissemination Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks." International Journal of Computer Sciences and Engineering 7, no. 7 (2019): 7–13. http://dx.doi.org/10.26438/ijcse/v7i7.713.
Full textLi, Wenjia, and Houbing Song. "ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks." IEEE Transactions on Intelligent Transportation Systems 17, no. 4 (2016): 960–69. http://dx.doi.org/10.1109/tits.2015.2494017.
Full textPark, Joon-Sang, and Seung Jun Beak. "Securing one-way hash chain based incentive mechanism for vehicular ad hoc networks." Peer-to-Peer Networking and Applications 7, no. 4 (2012): 737–42. http://dx.doi.org/10.1007/s12083-012-0178-y.
Full textXia, Hui, San-shun Zhang, Ye Li, Zhen-kuan Pan, Xin Peng, and Xiu-zhen Cheng. "An Attack-Resistant Trust Inference Model for Securing Routing in Vehicular Ad Hoc Networks." IEEE Transactions on Vehicular Technology 68, no. 7 (2019): 7108–20. http://dx.doi.org/10.1109/tvt.2019.2919681.
Full textFeng, Jingyu, Nan Liu, Jie Cao, Yuqing Zhang, and Guangyue Lu. "Securing Traffic-Related Messages Exchange Against Inside-and-Outside Collusive Attack in Vehicular Networks." IEEE Internet of Things Journal 6, no. 6 (2019): 9979–92. http://dx.doi.org/10.1109/jiot.2019.2933632.
Full textAdhikary, Kaushik, Shashi Bhushan, Sunil Kumar, and Kamlesh Dutta. "Evaluating the Impact of DDoS Attacks in Vehicular Ad-Hoc Networks." International Journal of Security and Privacy in Pervasive Computing 12, no. 4 (2020): 1–18. http://dx.doi.org/10.4018/ijsppc.2020100101.
Full textAlvanoudi, Angeliki. "“May I tell you something?”: When questions do not anticipate responses." Text & Talk 39, no. 4 (2019): 563–87. http://dx.doi.org/10.1515/text-2019-2040.
Full textSoleymani, Seyed Ahmad, Shidrokh Goudarzi, Mohammad Hossein Anisi, et al. "A Trust Model Using Edge Nodes and a Cuckoo Filter for Securing VANET under the NLoS Condition." Symmetry 12, no. 4 (2020): 609. http://dx.doi.org/10.3390/sym12040609.
Full textMondal, Atanu, and Sulata Mitra. "LoWVR: Low Overhead Watermark based Vehicle Revocation Scheme in VANET." International Journal of Sensors, Wireless Communications and Control 9, no. 1 (2019): 124–43. http://dx.doi.org/10.2174/2210327908666180828125842.
Full textChewinski, Max. "Mining as Canadian Nation-Building: Contentious Citizenship Regimes on the Move." Canadian Journal of Sociology 41, no. 3 (2016): 349–74. http://dx.doi.org/10.29173/cjs28211.
Full textGaleana-Zapién, Hiram, Miguel Morales-Sandoval, Carlos A. Leyva-Vázquez, and Javier Rubio-Loyola. "Smartphone-Based Platform for Secure Multi-Hop Message Dissemination in VANETs." Sensors 20, no. 2 (2020): 330. http://dx.doi.org/10.3390/s20020330.
Full textAbbas, Syed Ghazanfar, Ivan Vaccari, Faisal Hussain, et al. "Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach." Sensors 21, no. 14 (2021): 4816. http://dx.doi.org/10.3390/s21144816.
Full textBanani, Sam, Somsak Kittipiyakul, Surapa Thiemjarus, and Steven Gordon. "Safety Message Verification Using History-Based Relative-Time Zone Priority Scheme." Journal of Computer Networks and Communications 2019 (March 12, 2019): 1–14. http://dx.doi.org/10.1155/2019/8568912.
Full textLipiński, Bartosz, Wojciech Mazurczyk, Krzysztof Szczypiorski, and Piotr Śmietanka. "Towards Effective Security Framework for Vehicular Ad-Hoc Networks." Journal of Advances in Computer Networks 3, no. 2 (2015): 134–40. http://dx.doi.org/10.7763/jacn.2015.v3.155.
Full textTchepnda, Christian, Hassnaa Moustafa, Houda Labiod, and Gilles Bourdon. "Vehicular Networks Security." International Journal of Ambient Computing and Intelligence 1, no. 1 (2009): 39–52. http://dx.doi.org/10.4018/jaci.2009010104.
Full textJadoon, Ahmer Khan, Licheng Wang, Tong Li, and Muhammad Azam Zia. "Lightweight Cryptographic Techniques for Automotive Cybersecurity." Wireless Communications and Mobile Computing 2018 (June 26, 2018): 1–15. http://dx.doi.org/10.1155/2018/1640167.
Full textOnieva, Jose A., Ruben Rios, Rodrigo Roman, and Javier Lopez. "Edge-Assisted Vehicular Networks Security." IEEE Internet of Things Journal 6, no. 5 (2019): 8038–45. http://dx.doi.org/10.1109/jiot.2019.2904323.
Full textAlpcan, T., and S. Buchegger. "Security Games for Vehicular Networks." IEEE Transactions on Mobile Computing 10, no. 2 (2011): 280–90. http://dx.doi.org/10.1109/tmc.2010.146.
Full textShaaban, Abdelkader Magdy, Christoph Schmittner, Thomas Gruber, A. Baith Mohamed, Gerald Quirchmayr, and Erich Schikuta. "Automated Ontology-Based Security Requirements Identification for the Vehicular Domain." Journal of Data Intelligence 1, no. 4 (2020): 401–18. http://dx.doi.org/10.26421/jdi1.4-1.
Full textR, Neelaveni. "PERFORMANCE ENHANCEMENT AND SECURITY ASSISTANCE FOR VANET USING CLOUD COMPUTING." Journal of Trends in Computer Science and Smart Technology 01, no. 01 (2019): 39–50. http://dx.doi.org/10.36548/jtcsst.2019.1.004.
Full textDing, Fei, Xiaojun Sun, Xiaojin Ding, Ruoyu Su, Dengyin Zhang, and Hongbo Zhu. "Security-aware dual-hop communication for amplify-and-forward relay networks." International Journal of Distributed Sensor Networks 15, no. 9 (2019): 155014771987807. http://dx.doi.org/10.1177/1550147719878079.
Full textXu, Cheng, Xiaohong Huang, Maode Ma, and Hong Bao. "An Anonymous Handover Authentication Scheme Based on LTE-A for Vehicular Networks." Wireless Communications and Mobile Computing 2018 (July 3, 2018): 1–15. http://dx.doi.org/10.1155/2018/6251219.
Full textAbdulkader, Zaid A., Azizol Abdullah, Mohd Taufik Abdullah, and Zuriati Ahmad Zukarnain. "Vehicular Ad Hoc Networks and Security Issues: Survey." Modern Applied Science 11, no. 5 (2017): 30. http://dx.doi.org/10.5539/mas.v11n5p30.
Full textGao, Tianhan, Yanqiang Li, Nan Guo, and Ilsun You. "An anonymous access authentication scheme for vehicular ad hoc networks under edge computing." International Journal of Distributed Sensor Networks 14, no. 2 (2018): 155014771875658. http://dx.doi.org/10.1177/1550147718756581.
Full textYan, Gongjun, Ding Wen, Stephan Olariu, and Michele C. Weigle. "Security challenges in vehicular cloud computing." IEEE Transactions on Intelligent Transportation Systems 14, no. 1 (2013): 284–94. http://dx.doi.org/10.1109/tits.2012.2211870.
Full textXiaodong Lin, Rongxing Lu, Chenxi Zhang, Haojin Zhu, Pin-Han Ho, and Xuemin Shen. "Security in vehicular ad hoc networks." IEEE Communications Magazine 46, no. 4 (2008): 88–95. http://dx.doi.org/10.1109/mcom.2008.4481346.
Full textHaojin Zhu, Rongxing Lu, Xuemin Shen, and Xiaodong Lin. "Security in service-oriented vehicular networks." IEEE Wireless Communications 16, no. 4 (2009): 16–22. http://dx.doi.org/10.1109/mwc.2009.5281251.
Full textGoumidi, Hadjer, Zibouda Aliouat, and Saad Harous. "Vehicular Cloud Computing Security: A Survey." Arabian Journal for Science and Engineering 45, no. 4 (2019): 2473–99. http://dx.doi.org/10.1007/s13369-019-04094-0.
Full textPendyala, Pranavi, Aviva Munshi, and Anoushka Mehra. "Vehicular Security Drowsy Driver Detection System." International Journal of Engineering and Advanced Technology 10, no. 5 (2021): 206–9. http://dx.doi.org/10.35940/ijeat.e2751.0610521.
Full textLi, Congcong, Shouwen Ji, Xi Zhang, Haiping Wang, Dongfeng Li, and Huiyong Liu. "An Effective and Secure Key Management Protocol for Message Delivery in Autonomous Vehicular Clouds." Sensors 18, no. 9 (2018): 2896. http://dx.doi.org/10.3390/s18092896.
Full textVerma, Amandeep, Rahul Saha, Gulshan Kumar, and Tai-hoon Kim. "The Security Perspectives of Vehicular Networks: A Taxonomical Analysis of Attacks and Solutions." Applied Sciences 11, no. 10 (2021): 4682. http://dx.doi.org/10.3390/app11104682.
Full textLim, Kiho, Weihua Liu, Xiwei Wang, and Jingon Joung. "SSKM: Scalable and Secure Key Management Scheme for Group Signature Based Authentication and CRL in VANET." Electronics 8, no. 11 (2019): 1330. http://dx.doi.org/10.3390/electronics8111330.
Full textMiao, Junfeng, Zhaoshun Wang, Xue Miao, and Longyue Xing. "A Secure and Efficient Lightweight Vehicle Group Authentication Protocol in 5G Networks." Wireless Communications and Mobile Computing 2021 (September 21, 2021): 1–12. http://dx.doi.org/10.1155/2021/4079092.
Full text