參考文獻 |
參考文獻
中文文獻
[1] 柯志亨團隊,「計算機網路實驗─使用 NS2 模擬多媒體通訊與無線網路」,學貫出版,民國 96 年。
[2] 周淑美,「車載網路資訊安全應用之探討」,國立東華大學資訊工程所碩士論文,民國 97 年。
[3] 蔡効謙,「汽車隨意網路上偽造訊息的影響及防禦方法」,國立台灣科技大學資訊管理所碩士論文,民國 96 年。
[4] 鍾惟欣,「植基於身分安全架構之車載網路設計」,國立東華大學資訊工程所碩士論文,民國96年。
[5] 葉力齊,「車輛隨意網路模糊傳輸機制加密之研究」,國立台灣師範大學工程教育研究所碩士論文,民國 97 年。
英文文獻
[6] A. Jøsang, “An Algebra For Assessing Trust In Certification Chains,” In Proceedings of the Network and Distributed Systems Security , 1999.
[7] Artz, D., and Gil, Y., “A Survey of Trust in Computer Science and the Semantic Web” Software Engineering and the Semantic Web Vol. 5, No. 2, pp. 58-71, 2007
[8] Bauer, R.A., “Consumer behavior as risk taking,” Risk taking and information handling in consumer behavior, Boston, MA: Harvard University Press; pp. 23–33, 1967.
[9] Bigley G. A. and Pearce, J. L., “Straining for Shared Meaning in Organization Science: Problems of Trust and Distrust ,” The Academy of Management Review, Vol. 23, No. 3, pp. 405-421, Jul., 1998.
[10] Deutsch, M., "Cooperation And Trust: Some Theoretical Notes," In Nebraska Symposium on Motivation, pp. 275-319, 1962.
[11] Dotzer, F., Fischer, L. and Magiera, P., “VARS: A Vehicle Ad-Hoc Network Reputation System,” Sixth IEEE International Symposium on World of Wireless Mobile and Multimedia Networks, pp. 454 – 456, 2005.
[12] Gambetta, S. D., “Can we trust trust?” In Gambetta, Diego (ed.) Trust: Making and Breaking Cooperative Relations, pp. 213-237, 2000.
[13] Gefen, D., Karahanna, E. and Straub D. W., “Trust and TAM in Online Shopping: An Integrated Model ”MIS Quarterly, Vol. 27, No. 1, pp. 51-90, Mar., 2003.
[14] Gerlach, M., Steglich, S., Arbanowski, S., Wegdam, M. and Teunissen, H., “Trustworthy applications for Vehicular Environments,” IEEE Vehicular Technology Magazine, Vol.1, No.2, pp.9-15, 2006.
[15] Golbeck, J., “Trust on the World Wide Web: A Survey,” Foundations and Trends in Web Science, Vol. 1, Issue 2, pp.131-197, January 2006.
[16] Golle, P., Greene, D. and Staddon, J., “Detecting And Correcting Malicious Data In Vanets,” In Proceedings 1st ACM Int’l Workshop on Vehicular Ad Hoc Networks, pp. 29–37, Oct. 2004.
[17] Grandison, T. and Sloman, M., “A survey of trust in internet applications,” IEEE Communications Surveys and Tutorials, Vol.4, No.4, 2000.
[18] Heider, F., “Attitudes and cognitive organization.” Journal of Psychology, Vol. 21, pp. 107-112, 1946.
[19] Hubaux, J.P., Capkun S. and Luo, J., “The Security and Privacy of Smart Vehicles ,” Security & Privacy, IEEE Vol. 2 , Issue 3, pp. 49 - 55, 2004.
[20] Karnadi, F. K., Mo, Z. H. and Lan., K-C., “Rapid Generation of Realistic Mobility Models for VANET,” IEEE Wireless Communications and Networking Conference, pp. 2506-2511, 2007.
[21] Krackhardt, D. “The Strength Of Strong Ties,” N. Nohria and R. Eccles (Eds.), Networks and organizations: Structure, form, and action, Harvard Business School Press, 1994.
[22] Mui, L., Mohtashemi, M. and Halberstadt, A. “A computational model of trust and reputation,” In Proceedings of the 35th International Conference on System Science, pp. 280–287, 2002.
[23] Olmedilla, D., Rana, O., Matthews, B. and Nejdl, W. “Security And Trust Issues In Semantic Grids,” In Proceedings of the Dagsthul Seminar, Semantic Grid: The Convergence of Technologies, 2005.
[24] Ostermaier, B., D‥otzer F. and Strassberger M., “Enhancing the Security of Local Danger Warnings in VANETs - A Simulative Analysis of Voting Schemes,” In Proceedings of the The Second International Conference on Availability, Reliability and Security, pp. 422-431, 2007.
[25] Pai, S., Roosta, T., Wicker, S. and Sastry, S., “Using Social Network Theory Towards Development of Wireless Ad hoc Network Trust,” Networking and Applications Workshops, 2007.
[26] Papadimitratos, P., Kung, A., Hubaux, J-P. and Kargl, F., “Privacy and Identity Management for Vehicular Communication Systems a Position Paper,” In Proceedings of Workshop on Standards for Privacy in User-Centric Identity Management, 2006.
[27] Peden, M., Scurfield, R., Sleet, D., Mohan, D., Hyder, A., Jarawan, E. and Mathers, C., “The World Report On Road Traffic Injury Prevention,” Geneva, World Health Organization, 2004.
[28] Raya, M., Papadimitratos, P., Aad, I., Jungels D. and Hubaux, J.-P., “Eviction Of Misbehaving And Faulty Nodes In Vehicular Networks,” IEEE Journal on Selected Areas in Communications, Vol. 25, No. 8, pp. 1557-1568, 2007.
[29] Raya, M., Papadimitratos, P., Gligor, V. D. and Hubaux, J-P., “On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks,” IEEE The 27th Conference on Computer Communication, pp. 1238 – 1246, 2008.
[30] Sandhu, R. S., and Samarati, P., “Access Control Priciples and Practice,” Communications Magazine, IEEE, Vol. 32 , Issue 9 , pp. 40 – 48, 1994.
[31] Sitkin, B., Burt, R.S. and Camerer, C., "Not So Different After All: A Cross-Discipline View of Trust," The Academy of Management Review, Vol.23, No.3, pp. 393-404, 1998.
[32] Song, J-H, Wong, V. and Leung, V., "Wireless Location Privacy Protection in Vehicular Ad-Hoc Networks," IEEE International Conference on Communications, pp. 1-6, 2009.
[33] Sun, J., Zhang C. and Fang, Y., “An Id-Based Framework Achieving Privacy And Non-Repudiation In Vehicular Ad Hoc Networks,” IEEE Military Communications Conference, pp. 1–7, 2007.
[34] Sun, Y. L., Yu, W., Han, Z. and Liu, K.J.R., “Information theoretic framework of trust modeling and evaluation for ad hoc networks.” IEEE Journal on Selected Areas in Communications, Vol.24, No.2, pp. 305-317, 2006.
[35] Theodorakopoulos, G. and Baras, J. S., “Trust evaluation in ad-hoc networks,” In Proceedings ACM Workshop Wireless Security, pp. 1–10, Oct. 2004.
[36] Varadharajan, V., “A Note On Trust-Enhanced Security,” IEEE Security & Privacy, Vol. 7, No. 3, pp. 57-59, 2009.
[37] Wang, J., Liu, Y., Liu, X. and Zhang, J., “A Trust Propagation Scheme in VANETs,” IEEE Intelligent Vehicles Symposium, pp. 1067-1071, 2009.
[38] Zand, E.D., “Trust and Managerial Problem Solving,” Administrative Science Quarterly, Vol. 17, pp.229-239, 1972.
[39] Zhang, C., Lin, X., Lu, R., Ho, H. and Shen, X., “An Efficient Message Authentication Scheme for Vehicular Communications,” IEEE Vehicular Technology, Vol. 57, No.6, pp. 3357-3368, 2008.
[40] Zucker, L. G., “Production of trust: Institutional sources of economic structure, 1840 to 1920.” In B. M. Staw & L. L. Cummings (Eds.), Research in organizational behavior, Vol.8 pp. 53-112, 1986.
相關網站
[41] 行車記錄器實際裝載圖,http://yuann.tw/?p=1602
[42] 交通部運輸研究所RDS-TM系統,http://e-iot.iot.gov.tw/RDS-TMC_Format.htm
[43] SUMO, http://sumo.sourceforge.net/
[44] The Network Simulator – NS-2, http://www.isi.edu/nsnam/ns/
|