Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Pseudonym schemes in vehicular networks: A survey
Safety-critical applications in cooperative vehicular networks require authentication of nodes
and messages. Yet, privacy of individual vehicles and drivers must be maintained …
and messages. Yet, privacy of individual vehicles and drivers must be maintained …
Game theory meets network security and privacy
This survey provides a structured and comprehensive overview of research on security and
privacy in computer and communication networks that use game-theoretic approaches. We …
privacy in computer and communication networks that use game-theoretic approaches. We …
How talkative is your mobile device? An experimental study of Wi-Fi probe requests
J Freudiger - Proceedings of the 8th ACM conference on security & …, 2015 - dl.acm.org
The IEEE 802.11 standard defines Wi-Fi probe requests as a active mechanism with which
mobile devices can request information from access points and accelerate the Wi-Fi …
mobile devices can request information from access points and accelerate the Wi-Fi …
Why MAC address randomization is not enough: An analysis of Wi-Fi network discovery mechanisms
We present several novel techniques to track (unassociated) mobile devices by abusing
features of the Wi-Fi standard. This shows that using random MAC addresses, on its own …
features of the Wi-Fi standard. This shows that using random MAC addresses, on its own …
Security and privacy in location-based services for vehicular and mobile communications: An overview, challenges, and countermeasures
Location-based services (LBSs) have gained popularity as a result of the advances in
mobile and communication technologies. LBS provide users with relevant information based …
mobile and communication technologies. LBS provide users with relevant information based …
Security and privacy challenges in connected vehicular cloud computing
Vehicular cloud computing (VCC) is an improvement from conventional cloud computing to
new revolutionized computing services including intelligent transportation, autonomous …
new revolutionized computing services including intelligent transportation, autonomous …
[HTML][HTML] Security challenges of location privacy in VANETs and state-of-the-art solutions: A survey
A Vehicular Ad-hoc Network (VANET) comprises a group of moving or stationary vehicles
connected by a wireless network. VANETs play a vital role in providing safety and comfort to …
connected by a wireless network. VANETs play a vital role in providing safety and comfort to …
[HTML][HTML] Location privacy in VANETs: Provably secure anonymous key exchange protocol based on self-blindable signatures
Security and privacy in vehicular ad hoc networks (VANETs) are challenging in terms of
Intelligent Transportation Systems (ITS) features. The distribution and decentralisation of …
Intelligent Transportation Systems (ITS) features. The distribution and decentralisation of …
Non-cooperative location privacy
In mobile networks, authentication is a required primitive for most security protocols.
Unfortunately, an adversary can monitor pseudonyms used for authentication to track the …
Unfortunately, an adversary can monitor pseudonyms used for authentication to track the …
Check in or not? A stochastic game for privacy preserving in point-of-interest recommendation system
With the growing popularity of mobile social networks, point-of-interest (POI)
recommendation, which utilizes users' check-in data to suggest interesting places for users …
recommendation, which utilizes users' check-in data to suggest interesting places for users …