2011
DOI: 10.1016/j.comcom.2010.02.034
|View full text |Cite
|
Sign up to set email alerts
|

Novel access and remediation scheme in hierarchical trusted network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2012
2012
2014
2014

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 17 publications
(12 reference statements)
0
3
0
Order By: Relevance
“…For example, the SML indicates that 80% of platform states behave properly and the predefined threshold is 60%, so d in Equation is equal to 1. More details on computing the trust degree could refer to .In SAV4AV, we could change the threshold value adaptive to the network risk . M stands for d mapped to the EC field and indicates the integrity of the private key ( K i ).…”
Section: Securing Authentication and Verification For Ad Hoc Vehiclesmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, the SML indicates that 80% of platform states behave properly and the predefined threshold is 60%, so d in Equation is equal to 1. More details on computing the trust degree could refer to .In SAV4AV, we could change the threshold value adaptive to the network risk . M stands for d mapped to the EC field and indicates the integrity of the private key ( K i ).…”
Section: Securing Authentication and Verification For Ad Hoc Vehiclesmentioning
confidence: 99%
“…For example, the SML indicates that 80% of platform states behave properly and the predefined threshold is 60%, so d in Equation is equal to 1. More details on computing the trust degree could refer to .…”
Section: Securing Authentication and Verification For Ad Hoc Vehiclesmentioning
confidence: 99%
“…The AES algorithm and the Diffie-Hellman secret key exchange protocol are used to implement platform authentication and secure communication. In [5], a trusted level division function is introduced to extend the trusted attribute to the trusted grade, in this way a hierarchical trusted network is constructed. And they have implemented hierarchical manageable access control and feasible remediation services in the framework.…”
Section: Introductionmentioning
confidence: 99%