Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
RSU
biblio
A blockchain-based V2X communication system
Submitted by grigby1 on Tue, 11/22/2022 - 4:31pm
Organizations
ethereum
Telecommunications
RSU
Cooperative Intelligent Transport System (C-ITS)
Distributed Public Keystore (DPK)
ETSI
PKI/CA
Vehicle-to-Everything (V2X)
PKI Trust Models
signal processing
Europe
blockchain
pubcrawl
Human behavior
Human Factors
Metrics
resilience
Resiliency
Scalability
authentication
Public key
biblio
Integrity and Authentications for service security in vehicular ad hoc networks (VANETs): A Review
Submitted by grigby1 on Tue, 02/08/2022 - 10:40am
Compositionality
RSU
open access
V2V
integrity
manet privacy
human computer interaction
vehicular ad hoc networks
uncertainty
security
VANETs
composability
privacy
authentication
Resiliency
resilience
Metrics
pubcrawl
biblio
A Game-Theoretic Approach for Distributed Attack Mitigation in Intelligent Transportation Systems
Submitted by aekwall on Mon, 03/29/2021 - 10:49am
RSU
optimized traffic management
pollution control
Predictive Metrics
pubcrawl
Resiliency
resource allocation
road safety
road side units
maxmin game
Scalability
security game
security game model
security of data
security resource allocation
security resources
smart cities
Control Theory
ITS
Intelligent Transportation Systems
Human Factors
game-theoretic approach
game theory
game theoretic security
distributed attacks
distributed attack mitigation
decision-making abilities
data corruption attacks
connected vehicles
collision avoidance
attack mitigation
attack detection schemes
resilience
biblio
Enhancing the Performance Analysis of LWA Protocol Key Agreement in Vehicular Ad hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 9:18am
telecommunication security
Resiliency
restricted lightweight authentication protocol
road accidents
road safety
road side units
Roads
RSU
Security Arrangements
Protocols
user authentication
V2CH
V2V
VANET
vehicle-to-vehicle communication
vehicular ad hoc network
vehicular ad hoc networks
pubcrawl
private key cryptography
password
NS2 simulation
NS-2 simulation
mystery keys
Metrics
LWA protocol key agreement
key agreement
India
Cryptographic Protocols
Compositionality
car safety
automobiles
authentication
Ad Hoc Network Security
biblio
Certificateless Aggregate Message Authentication for Hierarchical Trusted Authority based VANET
Submitted by aekwall on Mon, 02/24/2020 - 9:57am
key escrow problem
certificateless aggregate signature scheme
certificateless public key cryptography
digital signature schemes
hierarchical organization
hierarchical trusted authority based VANET
hierarchical trusted authority privacy
high vehicle density scenarios
identity based cryptography
certificateless aggregate message authentication
message forgeability attack
multiple trusted authorities
neighboring vehicles
OBU device
side channel attacks
traditional PKC concept
Repudiation
digital signatures
telecommunication security
Resiliency
Human behavior
pubcrawl
composability
vehicular ad hoc networks
Metrics
message authentication
data privacy
public key cryptography
VANET
RSU
Aggregate Signature
aggregate verification
beacon messages
certificate management overhead
biblio
Privacy-Preserving Authentication Protocol based on Hybrid Cryptography for VANETs
Submitted by aekwall on Mon, 02/24/2020 - 9:56am
pseudonyms
symmetric cryptography
public key infrastructure
Asymmetric
hybrid
Hybrid Cryptography
OBU
privacy-preservation
privacy-preserving authentication protocol
computational overhead
RSU
symmetric
symmetric key encryption
TA
VANET communication
vehicles
Repudiation
security
VANET
public key cryptography
attacks
authentication
Metrics
vehicular ad hoc networks
privacy
composability
pubcrawl
Human behavior
Resiliency
Protocols
Cryptographic Protocols
telecommunication security
Cryptography
biblio
Sybil attack prevention through identity symmetric scheme in vehicular ad-hoc networks
Submitted by grigby1 on Mon, 01/21/2019 - 11:32am
sybil attacks
Peer-to-peer computing
protocol scheme
pubcrawl
Resiliency
road side units
Roads
RSU
Sybil attack prevention
mobile computing
symmetric key encryption
symmetric keys
telecommunication security
VANET
VANETs
vehicular ad hoc networks
vehicular networks
Identity management
ad-hoc networks
AES
authentication
CA
certification authority
Compositionality
Cryptographic Protocols
encryption
Ad Hoc Network Security
identity symmetric scheme
inter-communication
ITS
lightweight approach
malicious vehicle
Metrics
mobile ad hoc networks