Y. Sun, R. Lu, X. Lin, X. Shen, and J. Su, "An Efficient Pseudonymous Authentication Scheme with Strong Privacy Preservation for Vehicular Commu", IEEE Trans. Vehicular Technology ,Vol.59 ,2010 View Artical
R. Lu, X. Lin, H. Zhu, and X. Shen, "An Intelligent Secure and Privacy-Preserving Parking Scheme through Vehicular Communications", IEEE Trans. Vehicular Technology ,2010 View Artical
J.R. Douceur, "The Sybil Attack", Proc. First Int?l Workshop Peer-to-Peer Systems ,2002 View Artical
J. Eriksson, H. Balakrishnan, and S. Madden, "Cabernet: Vehicular Content Delivery Using WiFi ,2008 View Artical
M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D.S.Wallach, "Secure Routing for Structured Peer-to-Peer Overlay Networks", Symp. Operating Systems Design and Implementation ,2002 View Artical
S.Chang, Y.Qi, H.Zhu, J.Zhao, and X.Shen, "Footprint: Detecting Sybil Attacks in Urban Vehicular Networks", IEEE Trans. Parallel and Distributed Systems ,Vol.23 ,2012 View Artical
J. Newsome, E. Shi, D. Song, and A. Perrig,, "The Sybil Attack in Sensor Networks: Analysis & Defenses", Proc. Int?l Symp. Information Processing in Sensor ,2004 View Artical
S. Capkun, L. Buttya_n, and J. Hubaux, "Self-Organized Public Key Management for Mobile Ad Hoc Networks", IEEE Trans. Mobile Computing ,Vol.2 ,2003 View Artical
C. Piro, C. Shields, and B.N. Levine, "Detecting the Sybil Attack in Mobile Ad Hoc Networks", Proc. Securecomm and Workshop ,2006 View Artical
N. Borisov, "Computational Puzzles as Sybil Defenses", Proc. Sixth IEEE Int?l Conf. Peer-to-Peer Computin ,2006 View Artical
P. Maniatis, D.S.H. Rosenthal, M. Roussopoulos, M. Baker, T.Giuli, and Y. Muliadi, "Preserving Peer Replicas by Rate-Limited Sampled Voting", 19th ACM Symp. Operating Systems Principles ,2003 View Artical
H. Yu, M. Kaminsky, P.B. Gibbons, and A. Flaxman, "Sybilguard:Defending against Sybil Attacks via Social Networks ,2006 View Artical
M.S. Bouassida, G. Guette, M. Shawky, and B. Ducourthial, "Sybil Nodes Detection Based on Received Signal Strength Variations within Vanet ,Vol.9 ,2009 View Artical
B. Xiao, B. Yu, and C. Gao, "Detection and Localization of Sybil Nodes in Vanets", Workshop Dependability Issues in Wireless Ad Hoc N ,2006 View Artical
T. Zhou, R.R. Choudhury, P. Ning, and K. Chakrabarty, "Privacy Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks", Proc. Fourth Ann. Int?l Conf. Mobile and Ubiquitou ,2007 View Artical
Q. Wu, J. Domingo-Ferrer, and U. Gon_zalez-Nicola? s, "Balanced Trustworthiness, Safety and Privacy in Vehicle-to-vehicle Communications", IEEE Trans. Vehicular Technology ,Vol.59 ,2010 View Artical
L. Chen, S.-L. Ng, and G. Wang, "Threshold Anonymous Announcement in VANETs", IEEE J. Selected Areas in Comm ,Vol.29 ,2011 View Artical
C. Chen, X. Wang, W. Han, and B. Zang, "A Robust Detection of the Sybil Attack in Urban Vanets", IEEE Int?l Conf. Distributed Computing Systems Wor View Artical
S. Park, B. Aslam, D. Turgut, and C.C. Zou,, "Defense against Sybil Attack in Vehicular Ad Hoc Network Based on Roadside Unit Support ,2009 View Artical
J.K. Liu, V.K. Wei, and D.S. Wong, "Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract)", Australasian Conf. Information Security and Privac ,2004 View Artical
Y. Dodis, A. Kiayias, A. Nicolosi, and V. Shoup, "Anonymous Identification in Ad Hoc Groups", Proc. Int?l Conf. Theory and Applications of Crypt ,2004 View Artical
P.P. Tsang and V.K. Wei,, "Short Linkable Ring Signatures for EVoting,E-Cash and Attestation", Proc. Information Security Practice and Experience ,2005 View Artical
P.P. Tsang, V.K. Wei, T.K. Chan, M.H. Au, J.K. Liu, and D.S.Wong, "Separable Linkable Threshold Ring Signatures ,2004 View Artical
P.R. O ? stergard, "A Fast Algorithm for the Maximum Clique Problem ,Issue 120 ,2002 View Artical