Murthy et al., 2019
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Kaur et al. | Security issues in vehicular ad-hoc network (VANET) | |
| US11811943B2 (en) | Verification of messages using hash chaining | |
| Samara et al. | Security issues and challenges of vehicular ad hoc networks (VANET) | |
| CN109033862B (en) | A kind of distributed vehicle electronic system information security protection method | |
| US20210319702A1 (en) | Cryptography-Based Platooning Mechanism for Autonomous Vehicle Fleet Management | |
| Bao et al. | A lightweight authentication and privacy-preserving scheme for VANETs using TESLA and Bloom Filters | |
| Boualouache et al. | S2si: A practical pseudonym changing strategy for location privacy in vanets | |
| CN104394000A (en) | Batched certification method based on pseudonym verification public key in vehicle-mounted network | |
| Boeira et al. | Effects of colluding Sybil nodes in message falsification attacks for vehicular platooning | |
| WO2008063899A2 (en) | Method for exchanging message and verifying the authenticity of the messages in an ad hoc network | |
| Verma et al. | SeGCom: secure group communication in VANETs | |
| Papadimitratos et al. | Impact of vehicular communications security on transportation safety | |
| CN111132032B (en) | Method and system for improving communication efficiency and safety of V2X | |
| Wagan et al. | Security framework for low latency VANET applications | |
| Wang et al. | Countermeasure uncooperative behaviors with dynamic trust-token in VANETs | |
| CN113132098A (en) | Large-scale in-vehicle network-oriented extensible CAN bus safety communication method and device | |
| Mohd et al. | Simulation and analysis of DDoS attack on connected autonomous vehicular network using OMNET++ | |
| Ashritha et al. | RSU based efficient vehicle authentication mechanism for VANETs | |
| Bißmeyer et al. | Short paper: Experimental analysis of misbehavior detection and prevention in VANETs | |
| Jiang et al. | CPSS: CP-ABE based platoon secure sensing scheme against cyber-attacks | |
| Wang et al. | An information security protocol for automotive ethernet | |
| Noureldeen et al. | Replay attack on lightweight CAN authentication protocol | |
| Zhang et al. | A periodic authentication scheme for safety/security co-design on CAN buses | |
| Sharma et al. | Dyanimc key based authentication scheme for Vehicular Cloud Computing | |
| Murthy et al. | Analyzing the Impact of Secure CAN Networks on Braking Dynamics of Cooperative Driving |