2009 Asia-Pacific Conference on Computational Intelligence and Industrial Applications (PACIIA) 2009
DOI: 10.1109/paciia.2009.5406584
|View full text |Cite
|
Sign up to set email alerts
|

Design of privilege management system based on attribute certificate in mobile network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…To overcome the impact of jamming, an approach of message and channel redundancy has been demonstrated in [7] for the case of constant, random and intelligent jamming. This approach implies using alternative messages, namely the À la Carte (ACM) and Probe Vehicle Data (PVD) to deliver safety related data using redundant channels.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…To overcome the impact of jamming, an approach of message and channel redundancy has been demonstrated in [7] for the case of constant, random and intelligent jamming. This approach implies using alternative messages, namely the À la Carte (ACM) and Probe Vehicle Data (PVD) to deliver safety related data using redundant channels.…”
Section: Related Workmentioning
confidence: 99%
“…Consequently, the application fails only if no BSM message is received before t_react. The unreliability 〖Q(t)〗_(app =1-〖R(t)〗_app ) i.e., the probability of not receiving any BSM_i, i = 1... X, can be expressed as: (ti) x i=1 (7) Where 𝑄 𝑖 is the probability that BSM_i was not received at t_i. It should be noted that 𝑄 𝑖(𝑡 𝑖) is the packet error probability of BSM i .…”
mentioning
confidence: 99%