Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Ad Hoc Network Security
biblio
Privacy-Preserving Aggregate Signcryption for Vehicular Ad Hoc Networks
Submitted by grigby1 on Mon, 01/21/2019 - 11:33am
pubcrawl
Metrics
Resiliency
Compositionality
VANET
Privacy-preserving
Signcryption
Ad Hoc Network Security
biblio
Optimized Anonymity Updating in VANET Based on Information and Privacy Joint Metrics
Submitted by grigby1 on Mon, 01/21/2019 - 11:32am
security
pubcrawl
Metrics
Resiliency
Compositionality
anonymity updating
privacy awareness
vehicular network
Ad Hoc Network Security
biblio
Floating Genesis Block Enhancement for Blockchain Based Routing Between Connected Vehicles and Software-defined VANET Security Services
Submitted by grigby1 on Mon, 01/21/2019 - 11:32am
pubcrawl
Metrics
Resiliency
blockchain
Compositionality
VANET
Ad-Hoc Network
Secure Routing
security services
unmanned vehicle
Ad Hoc Network Security
biblio
Detection of malicious node in mobile ad-hoc network
Submitted by grigby1 on Mon, 01/21/2019 - 11:32am
mobile ad hoc networks
wireless links
Wireless communication
telecommunication network routing
selective acknowledgment
security
Routing protocols
routing overhead
Routing
Resiliency
pubcrawl
NS2 simulation
network security
network packet delivery ratio
mobile nodes
Ad Hoc Network Security
mobile ad hoc network
Metrics
MANET
malicious node detection
malicious node
intrusion detection mechanisms
firewalls software
firewalls
encryption software
Cryptography
Compositionality
Communication system security
AODV
adaptive acknowledgment
biblio
Sybil attack prevention through identity symmetric scheme in vehicular ad-hoc networks
Submitted by grigby1 on Mon, 01/21/2019 - 11:32am
sybil attacks
Peer-to-peer computing
protocol scheme
pubcrawl
Resiliency
road side units
Roads
RSU
Sybil attack prevention
mobile computing
symmetric key encryption
symmetric keys
telecommunication security
VANET
VANETs
vehicular ad hoc networks
vehicular networks
Identity management
ad-hoc networks
AES
authentication
CA
certification authority
Compositionality
Cryptographic Protocols
encryption
Ad Hoc Network Security
identity symmetric scheme
inter-communication
ITS
lightweight approach
malicious vehicle
Metrics
mobile ad hoc networks
biblio
Securing data forwarding against blackhole attacks in mobile ad hoc networks
Submitted by grigby1 on Mon, 01/21/2019 - 11:31am
Metrics
telecommunication security
secure message transmission
Scalability
Routing protocols
Resiliency
Receivers
pubcrawl
packet delivery ratio
network throughput
multi-path routing
mobile nodes
mobile ad hoc networks
mobile ad hoc network security
mobile ad hoc network
Ad Hoc Network Security
MANET
homomorphic encryption scheme
encryption
data transmission security
data forwarding security
data communication
Cryptographic Protocols
Compositionality
blackhole nodes
blackhole attacks
Blackhole attack
AOMDV protocol
ad hoc on-demand multipath distance vector protocol
biblio
Security Analysis of Vehicular Ad-hoc Networks based on Attack Tree
Submitted by grigby1 on Mon, 01/21/2019 - 11:31am
tree structure
private information
pubcrawl
Resiliency
security
Security analysis
security threat
smart cities
telecommunication security
privacy
trees (mathematics)
VANET
vehicle network
vehicles
vehicular ad hoc network
vehicular ad hoc networks
vehicular ad-hoc networks
Ad Hoc Network Security
open access environment
Metrics
Logic gates
integrity
information discreet
important security requirements
data privacy
confidentiality
confidential information
Conferences
Computers
Compositionality
Availability
attack-defense tree
attack tree
biblio
Using friendly jamming to improve route security and quality in ad hoc networks
Submitted by grigby1 on Fri, 02/02/2018 - 12:14pm
security performance
pubcrawl
Receivers
Resiliency
route security
Routing
secrecy outage probability
security
Security Metrics
physical layer security technique
service quality metrics
Signal to noise ratio
SOP
telecommunication network reliability
telecommunication network routing
telecommunication security
wireless area network
eavesdroppers
Ad hoc networks
auxiliary variable
composability
connection outage probability
convex optimization problem
convex programming
COP
D2D network
Ad Hoc Network Security
friendly jamming
Human behavior
Human Factors
Interference
Jamming
machine-to-machine communication
Measurement
biblio
Black hole attack prevention method using dynamic threshold in mobile ad hoc networks
Submitted by grigby1 on Fri, 02/02/2018 - 12:14pm
mobile ad hoc network
telecommunication security
security issues
security attack
Routing protocols
routing information exchange
Routing
Resiliency
pubcrawl
network infrastructure
mobile nodes
mobile ad hoc networks
Ad Hoc Network Security
MANET
malicious node
IP networks
Human Factors
Human behavior
fake routing information
dynamic threshold
data packets
composability
black hole node detection rate
black hole attack prevention method
biblio
Enhancing security for load balanced energy enhanced clustered bee ad hoc network using secret public keys
Submitted by grigby1 on Fri, 02/02/2018 - 12:14pm
pubcrawl
wireless network
telecommunication security
Security Public Key Cryptography
security
secured PKI scheme
secret public keys
Routing protocols
Routing
resource allocation
Resiliency
public key cryptography
Ad Hoc Network Security
path selection
mobile ad hoc networks
mobile ad hoc network
MANET
load balanced energy enhanced clustered bee ad hoc network
LBEE
Human Factors
Human behavior
Energy Efficiency
composability
« first
‹ previous
1
2
3
4
5
next ›
last »