ALL-PanosP-REFS-BC.bib





@incollection{JinKP:BC:2017,
  title = {{Security and Privacy in Vehicular Social Networks}},
  author = {Jin, Hongyu and Khodaei, Mohammad and Papadimitratos, Panos},
  booktitle = {Vehicular Social Networks},
  editor = {Anna Maria Vegni and Valeria Loscrì and Athanasios V. Vasilakos},
  month = {March},
  year = {2017},
  publisher = {CRC Press, Taylor {\&} Francis Group},
  webpdf = {https://people.kth.se/~papadim/publications/fulltext/Security-and-Privacy-in-Vehicular-Social-Networks.pdf},
  comment = {diva full text},
  typ = {BC}
}
@inbook{MoallaLSLPPH:BC:2016,
  title = {Experimentation with the PRESERVE VSS and the Score@F System},
  author = {Moalla, Rim and Lonc, Brigitte and Segarra, Gerard and Laguna Marcello and Papadimitratos, Panagiotis and Petit, Jonathan and Labiod, Houda},
  publisher = {John Wiley & Sons, Inc.},
  isbn = {9781119307853},
  doi = {10.1002/9781119307853.ch17},
  pages = {271--282},
  keywords = {cryptographic overhead analysis, field operational tests, intelligent transportation systems, performance indicators, PRESERVE security system, Score@F project, V2X use cases, vehicular security subsystem},
  booktitle = {Traffic Safety},
  comment = {TRA 2014 presentation},
  month = {June},
  webpdf = {https://people.kth.se/~papadim/publications/fulltext/early-PRESERVE_SCORE-F_experimentation.pdf},
  year = {2016},
  typ = {BC}
}
@incollection{Papadimitratos:BC:2011,
  title = {{Digital Signatures}},
  publisher = {Papasotiriou Books, Athens, Greece},
  editor = {M. Burmester and S. Gritzalis and S. Katsikas and V. Chrissikopoulos},
  author = {Papadimitratos, Panos},
  booktitle = {Modern Cryptography: Theory and Applications},
  month = {April},
  year = {2011},
  pages = {441--467},
  comment = {manuscript in Greek},
  webpdf = {https://people.kth.se/~papadim/publications/fulltext/digital-signatures-chapter-in-greek.pdf},
  typ = {BC}
}
@incollection{PapadimitratosH:BC:2011,
  title = {{Secure Vehicular Communication Systems}},
  publisher = {Springer, Berlin, Germany},
  editor = {H.C.A. van Tilborg and S. Jajodia},
  author = {Papadimitratos, Panos and Hubaux, J.-P.},
  booktitle = {Encyclopedia of Cryptography and Security (2nd Edition)},
  month = {January},
  year = {2011},
  doi = {10.1007/978-1-4419-5906-5_643},
  pages = {1140--1143},
  webpdf = {https://people.kth.se/~papadim/publications/fulltext/VC-security-PP-JPH-encyclopedia.pdf},
  typ = {BC}
}
@inbook{Papadimitratos:BC:2010,
  author = {Papadimitratos, Panos},
  title = {{Security and Privacy Mechanisms for Vehicular Networks}},
  booktitle = {Vehicular Networking: Automotive Applications and Beyond},
  editor = {M. Emmelmann and B. Bochow and C. C. Kellum},
  month = {April},
  year = {2010},
  doi = {10.1002/9780470661314.ch5},
  pages = {105--127},
  keywords = {global navigation satellite systems (GNSS), privacy mechanisms, secure vehicular communication architecture, security, vehicular communication (VC), vehicular networks},
  publisher = {John Wiley & Sons, NY, USA},
  webpdf = {https://people.kth.se/~papadim/publications/fulltext/security-privacy-mechanisms-vehicular-networks.pdf},
  comment = {},
  typ = {BC}
}
@incollection{PapadimitratosH:BC:2004,
  title = {{Secure Communication in Adverse Mobile Ad Hoc Networks}},
  publisher = {Springer, Boston, MA, USA},
  editor = {Cheng, Xiuzhen and Huang, Xiao and Du, Ding-Zhu},
  author = {Papadimitratos, Panos and Haas, Z. J.},
  doi = {10.1007/978-1-4613-0223-0_12},
  booktitle = {Ad Hoc Wireless Networking},
  month = {November},
  year = {2003},
  pages = {447--485},
  abstract = {The vision of nomadic computing with its ubiquitous access has stimulated much interest in the Mobile Ad Hoc Networking (MANET) technology. Those infrastructure-less, self-organized networks that either operate autonomously or as an extension to the wired networking infrastructure, are expected to support new MANET-based applications. However, the proliferation of this networking paradigm strongly depends on the availability of security provisions, among other factors. The absence of infrastructure, the nature of the envisioned applications, and the resource-constrained environment pose some new challenges in securing the protocols in the ad hoc networking environments. Moreover, the security requirements can differ significantly from those for infrastructure-based networks, while the provision of security enhancements may take completely different directions as well. In particular, practically any node in the open, collaborative MANET environment can abuse the network operation and disrupt or deny communication. In this paper we introduce our approach to this multifaceted and intriguing problem: a set of protocols that secure the fundamental networking operations of routing and data transmission. Moreover, we survey solutions that address the management of trust in ad hoc networks.},
  isbn = {978-1-4613-0223-0},
  webpdf = {https://people.kth.se/~papadim/publications/fulltext/Kluwer-book-chapter-secure-communication-ad-hoc-networks.pdf},
  typ = {BC}
}
@incollection{PapadimitratosHb:BC:2004,
  title = {{Securing Mobile Ad Hoc Networks}},
  publisher = {Springer, Boston, MA, USA},
  editor = {Mohammad Ilyas and Imad Mahgoub},
  author = {Papadimitratos, Panos and Haas, Z. J.},
  booktitle = {Mobile Computing Handbook},
  month = {December},
  year = {2004},
  pages = {483--507},
  isbn = {9780203504086},
  webpdf = {https://people.kth.se/~papadim/publications/fulltext/securing-mobile-adhoc-networks-crc-hanbook.pdf},
  typ = {BC}
}
@incollection{HaasDLPS:BC:2002,
  title = {Wireless ad hoc networks},
  author = {Haas, Zygmunt J. and Deng, Jing and Liang, Ben and Papadimitratos, Panagiotis and Sajama, Sajama},
  editor = {Proakis, John},
  year = {2002},
  month = {December},
  publisher = {John Wiley \& Sons, Inc.},
  isbn = {9780471219286},
  doi = {10.1002/0471219282.eot185},
  keywords = {ad hoc networks, MANET, MAC protocols for ad hoc network, routing protocols for ad hoc networks, proactive routing protocols, reactive routing protocols, hybrid routing protocols,   multicasting for ad hoc networks, security for ad hoc networks},
  booktitle = {Wiley Encyclopedia of Telecommunications},
  comment = {},
  webpdf = {https://people.kth.se/~papadim/publications/fulltext/AdhocNetworksEncyclopedia.pdf},
  typ = {BC}
}
@inbook{PapadimitratosH:BC:2002,
  author = {Papadimitratos, Panos and Haas, Z. J.},
  title = {Securing Mobile Ad Hoc Networks},
  booktitle = {The Handbook of Ad Hoc Wireless Networks},
  editors = {Ilyas, Mohammad and Dorf, Richard C.},
  year = {2002},
  month = {December},
  isbn = {0-8493-1332-5},
  pages = {551--567},
  doi = {989711.989743},
  publisher = {CRC Press, Inc.},
  address = {Boca Raton, FL, USA},
  webpdf = {https://people.kth.se/~papadim/publications/fulltext/securingadhocNetowrks_crc_ch.pdf},
  typ = {BC}
}

This file was generated by bibtex2html 1.98.