User menu

On the unobservability of a trust relation in mobile ad hoc networks

Bibliographic reference Heen, O. ; Guette, G. ; Genet, T.. On the unobservability of a trust relation in mobile ad hoc networks.Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks. Third IFIP WG11.2 International Workshop, WISTP 2009 (Brussels, Belgium, 1-4 September 2009). In: Markowitch, O.; Bilas, A.; Hoepman, J.-H.; Mitchell, C.J.; Quisquater, J.-J.;, Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks. Third IFIP WG11.2 International Workshop, WISTP 2009, Springer verlag2009, p. 1-11
Permanent URL http://hdl.handle.net/2078.1/67511
  1. Dötzer Florian, Privacy Issues in Vehicular Ad Hoc Networks, Privacy Enhancing Technologies (2006) ISBN:9783540347453 p.197-209, 10.1007/11767831_13
  2. Armando A., Basin D., Boichut Y., Chevalier Y., Compagna L., Cuellar J., Drielsma P. Hankes, Heám P. C., Kouchnarenko O., Mantovani J., Mödersheim S., von Oheimb D., Rusinowitch M., Santiago J., Turuani M., Viganò L., Vigneron L., The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, Computer Aided Verification (2005) ISBN:9783540272311 p.281-285, 10.1007/11513988_27
  3. Balfanz, D., Smetters, D., Stewart, P., Wong, H.: Talking to strangers: Authentication in adhoc wireless networks. In: Symposium on Network and Distributed Systems Security (NDSS 2002), San Diego, California (February 2002)
  4. Blake-Wilson Simon, Menezes Alfred, Authenticated Diffe-Hellman Key Agreement Protocols, Selected Areas in Cryptography (1999) ISBN:9783540658948 p.339-361, 10.1007/3-540-48892-8_26
  5. Boichut, Y., Genet, T., Glouche, Y., Heen, O.: Using Animation to Improve Formal Specifications of Security Protocols. In: 2nd Conference on Security in Network Architectures and Information Systems (SARSSI 2007), pp. 169–182 (2007)
  6. Fonseca, E., Festag, A., Baldessari, R., Aguiar, R.: Support of Anonymity in VANETs - Putting Pseudonymity into Practice. In: IEEE Wireless Communications and Networking Conference (2007)
  7. Gerlach, M., Festag, A., Leinmüller, T., Goldacker, G., Harsch, C.: Security Architecture for Vehicular Communication. In: Workshop on Intelligent Transportation (2007)
  8. Pfitzmann, A., Hansen, M.: Anonymity, unobservability, and pseudonymity: A consolidated proposal for terminology. Draft (July 2008)
  9. Pfitzmann Andreas, Köhntopp Marit, Anonymity, Unobservability, and Pseudonymity — A Proposal for Terminology, Designing Privacy Enhancing Technologies (2001) ISBN:9783540417248 p.1-9, 10.1007/3-540-44702-4_1
  10. Di Pietro Roberto, Molva Refik, Information Confinement, Privacy, and Security in RFID Systems, Computer Security – ESORICS 2007 (2007) ISBN:9783540748342 p.187-202, 10.1007/978-3-540-74835-9_13
  11. Prigent Nicolas, Bidan Christophe, Andreaux Jean-Pierre, Heen Olivier, Secure long term communities in ad hoc networks, 10.1145/986858.986874
  12. Schneier, B.: Blog article, tracking automobiles through their tires (December 2006)
  13. Stajano Frank, Anderson Ross, The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks, Security Protocols (2000) ISBN:9783540673811 p.172-182, 10.1007/10720107_24
  14. Toh, C.K.: Research challenges in intelligent transportation networks. Keynote Speach at IFIP Networking 2008, Singapour (May 2008)
  15. Turuani, M.: Security of Cryptographic Protocols: Decidability and Complexity. PhD thesis, Université of Nancy 1 (2003)
  16. van Deursen Ton, Mauw Sjouke, Radomirović Saša, Untraceability of RFID Protocols, Lecture Notes in Computer Science (2008) ISBN:9783540799658 p.1-15, 10.1007/978-3-540-79966-5_1