Skip to main content

Poster Abstract: Security in Commercial Applications of Vehicular Ad-Hoc Networks

  • Conference paper
Financial Cryptography and Data Security (FC 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6052))

Included in the following conference series:

  • 2348 Accesses

Abstract

This work proposes a combined protocol for incentive-based cooperation and strong authentication in Vehicular Ad-hoc Networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Buttyan, L., Hubaux, J.P.: Security and Cooperation in Wireless Networks. Cambridge Univ. Press, Cambridge (2007)

    Google Scholar 

  2. Li, F., Wu, J.: FRAME: An Innovative Incentive Scheme in Vehicular Networks. In: Proc. of IEEE International Conference on Communications (2009)

    Google Scholar 

  3. Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Caballero-Gil, P., Molina-Gil, J., Caballero-Gil, C., Hernández-Goya, C. (2010). Poster Abstract: Security in Commercial Applications of Vehicular Ad-Hoc Networks. In: Sion, R. (eds) Financial Cryptography and Data Security. FC 2010. Lecture Notes in Computer Science, vol 6052. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14577-3_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14577-3_41

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14576-6

  • Online ISBN: 978-3-642-14577-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics