A cloud PAAS for high scale, function, and velocity mobile applications-with reference application as the fully connected car

D Bernstein, N Vidovic, S Modi - 2010 Fifth International …, 2010 - ieeexplore.ieee.org
Cloud Computing is a term applied to large, hosted datacenters, usually geographically
distributed, which offer various computational services on a “utility” basis. Clouds are most …

Information technology security threats to modern e-enabled aircraft: A cautionary note

M Wolf, M Minzlaff, M Moser - Journal of Aerospace Information Systems, 2014 - arc.aiaa.org
Most passengers, airlines, and the aircraft industry in general are used to very high safety
standards and precautions surrounding aircraft systems. As the computerization of aircraft …

Security and privacy preservation in vehicular social networks

R Lu - 2012 - uwspace.uwaterloo.ca
Improving road safety and traffic efficiency has been a long-term endeavor for the
government, automobile industry and academia. Recently, the US Federal Communication …

SIPF: A secure installment payment framework for drive-thru internet

J Song, F Yang, KKR Choo, Z Zhuang… - ACM Transactions on …, 2017 - dl.acm.org
Ensuring the security and privacy of vehicular ad hoc networks (VANETs) and related
services such as secure payment has been the focus of recent research efforts. Existing …

Enabling Vehicle-to-Vehicle Trust in Rural Areas: An Evaluation of a Pre-Signature Scheme for Infrastructure-Limited Environments

D Almani, T Muller, X Carpent, T Yoshizawa, S Furnell - Future Internet, 2024 - mdpi.com
This research investigates the deployment and effectiveness of the novel Pre-Signature
scheme, developed to allow for up-to-date reputation being available in Vehicle-to-Vehicle …

[PDF][PDF] Future-proofing Secure V2V Communication against Clogging DoS Attacks

H Jin, Z Zhou, P Papadimitratos - … ARES 2024, Vienna, Austria, Jul 30 …, 2024 - nss.proj.kth.se
ABSTRACT Clogging Denial of Service (DoS) attacks have disrupted or disabled various
networks, in spite of security mechanisms. External adversaries can severely harm networks …

Publish Subscribe System Security Requirement: A Case Study for V2V Communication

H Gupta, A Nayak - IEEE Open Journal of the Computer …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) enables the linkage between the physical and digital domains,
with wireless sensor networks (WSNs) playing a vital role in this procedure. The market is …

Mix-Zones in Wireless Mobile Networks

P Papadimitratos - Encyclopedia of Cryptography, Security and Privacy, 2021 - Springer
Background The mix-zone concept was first proposed in Beresford and Stajano (2003) and
then refined in Beresford and Stajano (2004), considering user location privacy in emerging …

Deadlock-avoidance for streaming applications with split-join structure: Two case studies

P Li, K Agrawal, J Buhler… - ASAP 2010-21st …, 2010 - ieeexplore.ieee.org
Streaming is a highly effective paradigm for expressing parallelism in high-throughput
applications. A streaming computation is a network of compute nodes connected by …

Security and privacy in automotive on-board networks

H Schweppe - 2012 - pastel.hal.science
Electronic equipment has become an integral part of a vehicle's network architecture, which
consists of multiple buses and microcontrollers called Electronic Control Units (ECUs) …