Track me if you can: On the effectiveness of context-based identifier changes in deployed mobile networks, NDSS, 2012. ,
On the effectiveness of changing pseudonyms to provide location privacy in vanets, ESAS, 2007. ,
, , 2016.
Location tracking attack in ad hoc networks based on topology information, IEEE MASS, 2006. ,
Optimizing pseudonym updation in vehicular ad-hoc networks, Transactions on Computational Science IV, pp.136-148, 2009. ,
Pseudonym based mechanism for sustaining privacy in vanets, IEEE CICSYN, 2009. ,
Simulation of obfuscation and negotiation for location privacy, COSIT, 2005. ,
Strong and affordable location privacy in vanets: Identity diffusion using timeslots and swapping, IEEE VNC, 2010. ,
Mix-zones for location privacy in vehicular networks, ACM WiN-ITS, 2007. ,
Congestion attacks to autonomous cars using vehicular botnets, NDSS, 2015. ,
Interloc: An interference-aware rssi-based localization and sybil attack detection mechanism for vehicular ad hoc networks, IEEE CCNC, 2017. ,
Ghost: Concealing vehicular botnet communication in the vanet control channel, IEEE IWCMC, 2016. ,
Privacy in vanets using changing pseudonyms-ideal and real, IEEE VTC, 2007. ,
Achieving guaranteed anonymity in gps traces via uncertainty-aware path cloaking, IEEE Transactions on Mobile Computing, vol.9, issue.8, pp.1089-1107, 2010. ,
Towards modeling wireless location privacy, International Workshop on Privacy Enhancing Technologies, 2005. ,
Swing & swap: user-centric approaches towards maximizing location privacy, ACM Workshop on Privacy in Electronic Society, 2006. ,
Vclt: An accurate trajectory tracking attack based on crowdsourcing in vanets, vol.3, 2015. ,
An analytical model for random changing pseudonyms scheme in vanets, IEEE NCIS, 2011. ,
Connected vehicles: Surveillance threat and mitigation, 2015. ,
Pseudonym schemes in vehicular networks: A survey, IEEE Communications Surveys & Tutorials, vol.17, issue.1, pp.228-255, 2015. ,
Car hacking code released at defcon ,
Amoeba: Robust location privacy scheme for vanet, IEEE JSAC, vol.25, issue.8, 2007. ,
Driverless car could be hacked by 14-year-old from indonesia, senator warns, 2013. ,
Veins: Vehicles in network simulation ,
Tacking together efficient authentication, revocation, and privacy in vanets, IEEE SECON, 2009. ,
An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications, IEEE TVT, vol.59, issue.7, pp.3589-3603, 2010. ,
Department of Transportation. National motor vehicle crash causation survey, DOT HS, vol.811, p.59, 2008. ,
Department of Transportation FHWA. Mitigation strategies for design exceptions, 2014. ,
A classification of location privacy attacks and approaches, JPUC, vol.18, issue.1, pp.163-175, 2014. ,
Wireless access in vehicular environments, 2010. ,