-
Previous Article
Designing dynamical systems for security and defence network knowledge management. A case of study: Airport bird control falconers organizations
- DCDS-S Home
- This Issue
-
Next Article
Characteristic analysis of carrier based on the filtering and a multi-wavelet method for the information hiding
The application of improved-DAA for the vehicle network node security in single- and multi-trusted domain
1. | School of Information Engineering, Chang'an University, Xi'an, Shaanxi 710064, China |
2. | School of Electronic and Control Engineering, Chang'an University, Xi'an, Shaanxi 710064 |
3. | School of Information Engineering, Xizang Minzu University, Xianyang, Shaanxi 712082 |
References:
[1] |
S. Astapov and A. Riid, A multistage procedure of mobile vehicle acoustic identification for single-sensor embedded device, International Journal of Electronics and Telecommunications, 59 (2013), 151-160.
doi: 10.2478/eletel-2013-0018. |
[2] |
E. Brickell and J. Li, Enhanced privacy id: A direct anonymous attestation scheme with enhanced revocation capabilities, Dependable and Secure Computing IEEE Transactions on, (2007), 21-30.
doi: 10.1145/1314333.1314337. |
[3] |
M. Backes, M. Maffei and D. Unruh, Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol, Security and Privacy, 2008. SP 2008. IEEE Symposium on IEEE, 7 (2008), 202-215.
doi: 10.1109/SP.2008.23. |
[4] |
V. Cambazoglu and C. Rohne, Towards adaptive zero-knowledge protocols: A case study with fiat-shamir identification protocol, Computer Science, 6 (2013), 511-520. |
[5] |
S. Grzonkowski and P. Corcoran, A practical zero-knowledge proof protocol for web applications, Journal of Information Assurance and Security, 9 (2014), p329. |
[6] |
H. Khiabani, N. B. Idris and J. A. Manan, Unified trust establishment by leveraging remote attestation - modeling and analysis, Information Management and Computer Security, 21 (2013), 360-380.
doi: 10.1108/IMCS-11-2012-0062. |
[7] |
M. H. Kim, S. Lee and K. C. Lee, Performance evaluation of node-mapping-based flexray-can gateway for in-vehicle networking system, Intelligent Automation and Soft Computing, 21 (2015), 251-263.
doi: 10.1080/10798587.2014.981999. |
[8] |
N. Kaaniche, E. E. Moustaine and M. Laurent, A Novel Zero-Knowledge Scheme for Proof of Data Possession in Cloud Storage Applications, Cluster, Cloud and Grid Computing (CCGrid), 2014 14th IEEE/ACM International Symposium on IEEE, 2 (2014), 522-531.
doi: 10.1109/CCGrid.2014.81. |
[9] |
K. Lee, H. L. Dong and M. Yung, Sequential aggregate signatures with short public keys: Design, analysis and implementation studies, Lecture Notes in Computer Science, 7778 (2013), 423-442.
doi: 10.1007/978-3-642-36362-7_26. |
[10] |
A. Malaver, N. Motta, P. Corke and F. Gonzalez, Development and integration of a solar powered unmanned aerial vehicle and a wireless sensor network to monitor greenhouse gases, Sensors, 15 (2015), 4072-4096.
doi: 10.3390/s150204072. |
[11] |
F. A. Mohamed and E. E. M. Hemayed, Using trusted computing in trusted mail transfer protocol, Security and Communication Networks, 7 (2014), 926-933.
doi: 10.1002/sec.804. |
[12] |
S. Patel, V. Patel and D. Jinwala, Privacy preserving distributed k-means clustering in malicious model using zero knowledge proof, Lecture Notes in Computer Science, 7753 (2013), 420-431.
doi: 10.1007/978-3-642-36071-8_33. |
[13] |
J. Suwatthikul, R. Mcmurran and R. P. Jones, Adaptive OSEK Network Management for in-vehicle network fault detection, 2007. ICVES. IEEE International Conference on Vehicular Electronics and Safety, 8 (2007), 1-6.
doi: 10.1109/ICVES.2007.4456405. |
[14] |
S. Woo, H. J. Jo and D. H. Lee, A practical wireless attack on the connected car and security protocol for in-vehicle can, Intelligent Transportation Systems IEEE Transactions on, 16 (2015), 993-1006.
doi: 10.1109/TITS.2014.2351612. |
[15] |
Z. Yan, W. Sun, Z. Chen and S. Zhao, A parallel geographical network vehicle routing algorithm on pc clusters, Acta Geodaetica Et Cartographica Sinica, 43 (2014), 753-760. |
[16] |
M. Ziefle, P. Pappachan, E. M. Jakobs and H. Wallentowitz, Visual and auditory interfaces of advanced driver assistant systems for older drivers, Lecture Notes in Computer Science, 5105 (2008), 62-69.
doi: 10.1007/978-3-540-70540-6_8. |
show all references
References:
[1] |
S. Astapov and A. Riid, A multistage procedure of mobile vehicle acoustic identification for single-sensor embedded device, International Journal of Electronics and Telecommunications, 59 (2013), 151-160.
doi: 10.2478/eletel-2013-0018. |
[2] |
E. Brickell and J. Li, Enhanced privacy id: A direct anonymous attestation scheme with enhanced revocation capabilities, Dependable and Secure Computing IEEE Transactions on, (2007), 21-30.
doi: 10.1145/1314333.1314337. |
[3] |
M. Backes, M. Maffei and D. Unruh, Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol, Security and Privacy, 2008. SP 2008. IEEE Symposium on IEEE, 7 (2008), 202-215.
doi: 10.1109/SP.2008.23. |
[4] |
V. Cambazoglu and C. Rohne, Towards adaptive zero-knowledge protocols: A case study with fiat-shamir identification protocol, Computer Science, 6 (2013), 511-520. |
[5] |
S. Grzonkowski and P. Corcoran, A practical zero-knowledge proof protocol for web applications, Journal of Information Assurance and Security, 9 (2014), p329. |
[6] |
H. Khiabani, N. B. Idris and J. A. Manan, Unified trust establishment by leveraging remote attestation - modeling and analysis, Information Management and Computer Security, 21 (2013), 360-380.
doi: 10.1108/IMCS-11-2012-0062. |
[7] |
M. H. Kim, S. Lee and K. C. Lee, Performance evaluation of node-mapping-based flexray-can gateway for in-vehicle networking system, Intelligent Automation and Soft Computing, 21 (2015), 251-263.
doi: 10.1080/10798587.2014.981999. |
[8] |
N. Kaaniche, E. E. Moustaine and M. Laurent, A Novel Zero-Knowledge Scheme for Proof of Data Possession in Cloud Storage Applications, Cluster, Cloud and Grid Computing (CCGrid), 2014 14th IEEE/ACM International Symposium on IEEE, 2 (2014), 522-531.
doi: 10.1109/CCGrid.2014.81. |
[9] |
K. Lee, H. L. Dong and M. Yung, Sequential aggregate signatures with short public keys: Design, analysis and implementation studies, Lecture Notes in Computer Science, 7778 (2013), 423-442.
doi: 10.1007/978-3-642-36362-7_26. |
[10] |
A. Malaver, N. Motta, P. Corke and F. Gonzalez, Development and integration of a solar powered unmanned aerial vehicle and a wireless sensor network to monitor greenhouse gases, Sensors, 15 (2015), 4072-4096.
doi: 10.3390/s150204072. |
[11] |
F. A. Mohamed and E. E. M. Hemayed, Using trusted computing in trusted mail transfer protocol, Security and Communication Networks, 7 (2014), 926-933.
doi: 10.1002/sec.804. |
[12] |
S. Patel, V. Patel and D. Jinwala, Privacy preserving distributed k-means clustering in malicious model using zero knowledge proof, Lecture Notes in Computer Science, 7753 (2013), 420-431.
doi: 10.1007/978-3-642-36071-8_33. |
[13] |
J. Suwatthikul, R. Mcmurran and R. P. Jones, Adaptive OSEK Network Management for in-vehicle network fault detection, 2007. ICVES. IEEE International Conference on Vehicular Electronics and Safety, 8 (2007), 1-6.
doi: 10.1109/ICVES.2007.4456405. |
[14] |
S. Woo, H. J. Jo and D. H. Lee, A practical wireless attack on the connected car and security protocol for in-vehicle can, Intelligent Transportation Systems IEEE Transactions on, 16 (2015), 993-1006.
doi: 10.1109/TITS.2014.2351612. |
[15] |
Z. Yan, W. Sun, Z. Chen and S. Zhao, A parallel geographical network vehicle routing algorithm on pc clusters, Acta Geodaetica Et Cartographica Sinica, 43 (2014), 753-760. |
[16] |
M. Ziefle, P. Pappachan, E. M. Jakobs and H. Wallentowitz, Visual and auditory interfaces of advanced driver assistant systems for older drivers, Lecture Notes in Computer Science, 5105 (2008), 62-69.
doi: 10.1007/978-3-540-70540-6_8. |
[1] |
Subrata Dasgupta. Disentangling data, information and knowledge. Big Data & Information Analytics, 2016, 1 (4) : 377-389. doi: 10.3934/bdia.2016016 |
[2] |
Roberto Civino, Riccardo Longo. Formal security proof for a scheme on a topological network. Advances in Mathematics of Communications, 2021 doi: 10.3934/amc.2021009 |
[3] |
Alessandro Ferriero. A direct proof of the Tonelli's partial regularity result. Discrete and Continuous Dynamical Systems, 2012, 32 (6) : 2089-2099. doi: 10.3934/dcds.2012.32.2089 |
[4] |
Jose-Luis Roca-Gonzalez. Designing dynamical systems for security and defence network knowledge management. A case of study: Airport bird control falconers organizations. Discrete and Continuous Dynamical Systems - S, 2015, 8 (6) : 1311-1329. doi: 10.3934/dcdss.2015.8.1311 |
[5] |
Pierre-Emmanuel Mazaré, Olli-Pekka Tossavainen, Daniel B. Work. Computing travel times from filtered traffic states. Discrete and Continuous Dynamical Systems - S, 2014, 7 (3) : 557-578. doi: 10.3934/dcdss.2014.7.557 |
[6] |
Lars Grüne. Computing Lyapunov functions using deep neural networks. Journal of Computational Dynamics, 2021, 8 (2) : 131-152. doi: 10.3934/jcd.2021006 |
[7] |
Yang Lu, Jiguo Li. Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model. Advances in Mathematics of Communications, 2017, 11 (1) : 161-177. doi: 10.3934/amc.2017010 |
[8] |
Mahendra Piraveenan, Mikhail Prokopenko, Albert Y. Zomaya. On congruity of nodes and assortative information content in complex networks. Networks and Heterogeneous Media, 2012, 7 (3) : 441-461. doi: 10.3934/nhm.2012.7.441 |
[9] |
Mary Luz Mouronte, Rosa María Benito. Structural analysis and traffic flow in the transport networks of Madrid. Networks and Heterogeneous Media, 2015, 10 (1) : 127-148. doi: 10.3934/nhm.2015.10.127 |
[10] |
Gabriella Bretti, Roberto Natalini, Benedetto Piccoli. Numerical approximations of a traffic flow model on networks. Networks and Heterogeneous Media, 2006, 1 (1) : 57-84. doi: 10.3934/nhm.2006.1.57 |
[11] |
Gabriella Bretti, Roberto Natalini, Benedetto Piccoli. Fast algorithms for the approximation of a traffic flow model on networks. Discrete and Continuous Dynamical Systems - B, 2006, 6 (3) : 427-448. doi: 10.3934/dcdsb.2006.6.427 |
[12] |
Paola Goatin. Traffic flow models with phase transitions on road networks. Networks and Heterogeneous Media, 2009, 4 (2) : 287-301. doi: 10.3934/nhm.2009.4.287 |
[13] |
Alberto Bressan, Ke Han. Existence of optima and equilibria for traffic flow on networks. Networks and Heterogeneous Media, 2013, 8 (3) : 627-648. doi: 10.3934/nhm.2013.8.627 |
[14] |
Alessia Marigo. Optimal traffic distribution and priority coefficients for telecommunication networks. Networks and Heterogeneous Media, 2006, 1 (2) : 315-336. doi: 10.3934/nhm.2006.1.315 |
[15] |
Ye Sun, Daniel B. Work. Error bounds for Kalman filters on traffic networks. Networks and Heterogeneous Media, 2018, 13 (2) : 261-295. doi: 10.3934/nhm.2018012 |
[16] |
Abraham Sylla. Influence of a slow moving vehicle on traffic: Well-posedness and approximation for a mildly nonlocal model. Networks and Heterogeneous Media, 2021, 16 (2) : 221-256. doi: 10.3934/nhm.2021005 |
[17] |
Serap Ergün, Bariş Bülent Kırlar, Sırma Zeynep Alparslan Gök, Gerhard-Wilhelm Weber. An application of crypto cloud computing in social networks by cooperative game theory. Journal of Industrial and Management Optimization, 2020, 16 (4) : 1927-1941. doi: 10.3934/jimo.2019036 |
[18] |
Stamatios Katsikas, Vassilli Kolokoltsov. Evolutionary, mean-field and pressure-resistance game modelling of networks security. Journal of Dynamics and Games, 2019, 6 (4) : 315-335. doi: 10.3934/jdg.2019021 |
[19] |
Melody Alsaker, Sarah Jane Hamilton, Andreas Hauptmann. A direct D-bar method for partial boundary data electrical impedance tomography with a priori information. Inverse Problems and Imaging, 2017, 11 (3) : 427-454. doi: 10.3934/ipi.2017020 |
[20] |
Xuena Yan, Shunfu Jin, Wuyi Yue, Yutaka Takahashi. Performance analysis and system optimization of an energy-saving mechanism in cloud computing with correlated traffic. Journal of Industrial and Management Optimization, 2021 doi: 10.3934/jimo.2021106 |
2021 Impact Factor: 1.865
Tools
Metrics
Other articles
by authors
[Back to Top]