Author of the publication

Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications.

, , and . IEEE Trans. Vehicular Technology, 59 (2): 559-573 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mixing Genetic Algorithms and V-MDAV to Protect Microdata., , and . Computational Intelligence for Privacy and Security, volume 394 of Studies in Computational Intelligence, Springer, (2012)Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications., , and . IEEE Trans. Vehicular Technology, 59 (2): 559-573 (2010)Hybrid microdata using microaggregation., and . Inf. Sci., 180 (15): 2834-2844 (2010)Privacy homomorphisms for social networks with private relationships., , , and . Comput. Networks, 52 (15): 3007-3016 (2008)Rational behavior in peer-to-peer profile obfuscation for anonymous keyword search: The multi-hop scenario., and . Inf. Sci., (2012)Asymmetric group key agreement protocol for open networks and its application to broadcast encryption., , , , and . Comput. Networks, 55 (15): 3246-3255 (2011)Rational behavior in peer-to-peer profile obfuscation for anonymous keyword search., and . Inf. Sci., 185 (1): 191-204 (2012)Decapitation of networks with and without weights and direction: The economics of iterated attack and defense., and . Comput. Networks, 55 (1): 119-130 (2011)A variable-MDAV-based partitioning strategy to continuous multivariate microaggregation with genetic algorithms., , and . IJCNN, page 1-7. IEEE, (2010)