2004
DOI: 10.1109/msp.2004.26
|View full text |Cite
|
Sign up to set email alerts
|

The security and privacy of smart vehicles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
309
0

Year Published

2006
2006
2015
2015

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 653 publications
(309 citation statements)
references
References 11 publications
0
309
0
Order By: Relevance
“…Reference [16] gives a first overview on this subject. When using position-based routing, one important aspect is the correctness of position data.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Reference [16] gives a first overview on this subject. When using position-based routing, one important aspect is the correctness of position data.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, the verification system described in References [16,17] contains base stations building a trustworthy network. In the approach called verifiable multilateration, four of these base stations are involved in every position verification procedure.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Several authors, for instance Hubaux et al [15] or Dötzer in [6], addressed that topic. They argue, that cars are personal devices that are usually kept for a rather long time and even innocent looking data may become privacy-relevant when evaluated over a longer period of time.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, they propose to use changing pseudonyms as temporary identifiers to preserve privacy. In [15], Hubaux et al also review entropy as a metric to quantify the effectiveness of pseudonym changes. In [16], Sampigethaya et al take up the idea of selecting certain nodes as mix nodes.…”
Section: Related Workmentioning
confidence: 99%