Login / Signup
A TPM-based architecture for improved security and anonymity in vehicular ad hoc networks.
Gilles Guette
Olivier Heen
Published in:
VNC (2009)
Keyphrases
</>
vehicular ad hoc networks
trusted computing
ring signature scheme
trusted platform module
computing platform
data dissemination
security properties
database
security requirements
routing protocol
data flow
key management
security analysis
security protocols
data delivery