Back to Results
First PageMeta Content
Search algorithms / Error detection and correction / Hash function / Information retrieval / Artificial intelligence / SHA-1 / Bloom filter / Sybil attack / Hashing / Cryptography / Cryptographic hash functions


582 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 3, MARCH 2011 P2DAP – Sybil Attacks Detection in Vehicular Ad Hoc Networks
Add to Reading List

Document Date: 2012-03-12 23:31:44


Open Document

File Size: 906,18 KB

Share Result on Facebook

Company

M NV / IEEE JOURNAL / VEHICULAR AD HOC NETWORKS / Fig / /

Country

Columbia / /

Currency

pence / USD / /

/

Event

FDA Phase / /

Facility

Incheon International Airport / Duke University / North Carolina State University / /

IndustryTerm

tamper-proof device / pseudonym processing tasks / dense networks / ad hoc network / online infrastructure support / wireless access points / light-weight solution / layer protocol / backhaul network / /

Organization

Duke University / Durham / Department of Electrical and Computer Engineering / North Carolina State University / Raleigh / Department of Computer Science / Department of Motor Vehicle / /

Person

Sybil Attacks / Sybil Attack / Roy Choudhury / /

Position

coupon collector / /

Product

GS / P2 / /

Technology

adaptive P2 DAP algorithm / E-P2 DAP algorithm / P2 DAP algorithm / private key / secret key / public key / wireless access / PHY layer protocol / Simulation / Digital Object Identifier / /

SocialTag