An innovative reputation system for trustworthy and secure vehicle-to-vehicle communication
Vehicular Ad Hoc Networks (VANETs) are a promising technology that ensures secure and efficient transportation by allowing vehicles to seamlessly communicate with each other and with infrastructure to share real-time information and make better decisions while travelling. However, determining which...
| Main Author: | Almani, Dimah |
|---|---|
| Format: | Thesis (University of Nottingham only) |
| Language: | English |
| Published: |
2025
|
| Subjects: | |
| Online Access: | https://eprints.nottingham.ac.uk/81305/ |
Similar Items
A fairy tale approach to cooperative vehicle positioning
by: Stephenson, Scott, et al.
Published: (2014)
by: Stephenson, Scott, et al.
Published: (2014)
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
by: Abdulkader, Zaid A.
Published: (2018)
by: Abdulkader, Zaid A.
Published: (2018)
Digital signature-based secure communication in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011)
by: Parvin, Sazia, et al.
Published: (2011)
Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments
by: Zakhary, Sameh R., et al.
Published: (2010)
by: Zakhary, Sameh R., et al.
Published: (2010)
Trust relationships and reputation relationships for service oriented environment
by: Hussain, Farookh, et al.
Published: (2006)
by: Hussain, Farookh, et al.
Published: (2006)
Seamless vertical handover technique for vehicular ad-hoc networks using artificial bee colony-particle swarm optimisation
by: Abdulwahhab, Mohanad Mazin
Published: (2019)
by: Abdulwahhab, Mohanad Mazin
Published: (2019)
A Secure Key Management Model for Wireless Mesh Networks
by: Gao, Li, et al.
Published: (2010)
by: Gao, Li, et al.
Published: (2010)
Reputation ontology for reputation systems
by: Chang, Elizabeth, et al.
Published: (2006)
by: Chang, Elizabeth, et al.
Published: (2006)
A New "F-Lueg" Cryptosystem and its Security
by: Choo, Mun Yoong
Published: (2002)
by: Choo, Mun Yoong
Published: (2002)
Trust and reputation relationships in service-oriented environments
by: Chang, Elizabeth, et al.
Published: (2005)
by: Chang, Elizabeth, et al.
Published: (2005)
Reputation ontology for reputation systems
by: Chang, Elizabeth, et al.
Published: (2005)
by: Chang, Elizabeth, et al.
Published: (2005)
A new proxy signature scheme as secure as EIGamal signature
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
A robust methodology for prediction of trust and reputation values
by: Hussain, Farookh Khadeer, et al.
Published: (2008)
by: Hussain, Farookh Khadeer, et al.
Published: (2008)
Ontological framework for trust and reputation for DBE
by: Hammadi, Adil, et al.
Published: (2008)
by: Hammadi, Adil, et al.
Published: (2008)
An efficient identity-based group signature scheme over elliptic curves
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
A Study of Security Limitations in Virtual Local Area Network Implementation
by: Balasundaram, Arumugam
Published: (2003)
by: Balasundaram, Arumugam
Published: (2003)
Examining the impact of social media on consumer perception of corporate reputation
by: Dong, Huiyun
Published: (2017)
by: Dong, Huiyun
Published: (2017)
Defining reputation in service oriented environment
by: Hussain, Farookh, et al.
Published: (2006)
by: Hussain, Farookh, et al.
Published: (2006)
Reputation relationship and its inner relationships for service oriented environments
by: Hussain, Farookh, et al.
Published: (2006)
by: Hussain, Farookh, et al.
Published: (2006)
Security Framework Based on Reputation Mechanism for Peer-To-Peer Systems
by: Sinnanaidu, Subba Rao
Published: (2004)
by: Sinnanaidu, Subba Rao
Published: (2004)
Integrated OBD-II and direct controller area network access for vehicle monitoring system
by: Khosravinia, Kavian
Published: (2018)
by: Khosravinia, Kavian
Published: (2018)
CognitiveCharge: disconnection tolerant adaptive collaborative and predictive vehicular charging
by: Radenkovic, Milena, et al.
Published: (2018)
by: Radenkovic, Milena, et al.
Published: (2018)
Trustworthiness measurement methodology for e-business
by: Hussain, Farookh, et al.
Published: (2006)
by: Hussain, Farookh, et al.
Published: (2006)
Formulating a security layer of cloud data storage framework based on multi agent system architecture.
by: Mohamed Talib, Amir, et al.
Published: (2010)
by: Mohamed Talib, Amir, et al.
Published: (2010)
A review on parametric and nonparametric empirical likelihood
method based on interval-censored data
by: Zainudin, Norazelah, et al.
Published: (2014)
by: Zainudin, Norazelah, et al.
Published: (2014)
Effect of sudden expansion for varied area ratios at subsonic and sonic flow regimes
by: Sethuraman, Vigneshvaran, et al.
Published: (2016)
by: Sethuraman, Vigneshvaran, et al.
Published: (2016)
Analysis of variation of stiffness derivative with Mach number and angle of attack for a supersonic flow
by: Crasta, Asha, et al.
Published: (2016)
by: Crasta, Asha, et al.
Published: (2016)
Effect of semi vertex angle on stability derivatives for an
oscillating cone for constant value of specific
heat ratio
by: Shabana, Aysha, et al.
Published: (2018)
by: Shabana, Aysha, et al.
Published: (2018)
Achieving sustainable coastal environment in Langkawi, Malaysia
by: Mazlin, Mokhtar *, et al.
Published: (2017)
by: Mazlin, Mokhtar *, et al.
Published: (2017)
Antivenom Cross-Neutralization of the Venoms of Hydrophis schistosus and Hydrophis curtus, Two Common Sea Snakes in Malaysian Waters
by: Choo, Hock Tan, et al.
Published: (2015)
by: Choo, Hock Tan, et al.
Published: (2015)
The development of a low-cost integrated marine navigation system for leisure crafts and small boats
by: Mahmud, Mohd. Razali, et al.
Published: (2005)
by: Mahmud, Mohd. Razali, et al.
Published: (2005)
405 selesai jalani latihan PSSTLDM, PALAPES Laut
by: Abdullah, Rokiah
Published: (2014)
by: Abdullah, Rokiah
Published: (2014)
Secure e-transactions using mobile agents with agent broker
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Key management for wireless sensor network security
by: Tian, Biming
Published: (2011)
by: Tian, Biming
Published: (2011)
Trust Based Security for Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
Refining output efficiency for vehicular delay tolerant network routing protocols
by: Rathod, Jay
Published: (2017)
by: Rathod, Jay
Published: (2017)
Effect of Co-60 gamma-ray irradiation on electrical properties of Ti/Au/GaAs1-xNx Schottky diodes
by: Teffahi, A., et al.
Published: (2016)
by: Teffahi, A., et al.
Published: (2016)
Improvement of a convertible undeniable partially blind signature scheme
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
An attack on undeniable partially blind signatures
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Safety & Security Analysis of Sea Transportation in Indonesia
by: Faturachman, Danny, et al.
Published: (2013)
by: Faturachman, Danny, et al.
Published: (2013)
Similar Items
-
A fairy tale approach to cooperative vehicle positioning
by: Stephenson, Scott, et al.
Published: (2014) -
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
by: Abdulkader, Zaid A.
Published: (2018) -
Digital signature-based secure communication in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011) -
Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments
by: Zakhary, Sameh R., et al.
Published: (2010) -
Trust relationships and reputation relationships for service oriented environment
by: Hussain, Farookh, et al.
Published: (2006)