scispace - formally typeset
F

Frank Kargl

Researcher at University of Ulm

Publications -  268
Citations -  8174

Frank Kargl is an academic researcher from University of Ulm. The author has contributed to research in topics: Vehicular ad hoc network & Wireless ad hoc network. The author has an hindex of 40, co-authored 253 publications receiving 7057 citations. Previous affiliations of Frank Kargl include Information Technology University & Humboldt State University.

Papers
More filters
Journal ArticleDOI

Secure vehicular communication systems: design and architecture

TL;DR: This work addresses the problem of security and protection of private user information within the SeVeCom project, having developed a security architecture that provides a comprehensive and practical solution that can be quickly adopted and deployed.
Journal ArticleDOI

Pseudonym Schemes in Vehicular Networks: A Survey

TL;DR: This survey covers pseudonym schemes based on public key and identity-based cryptography, group signatures and symmetric authentication, and compares the different approaches, gives an overview of the current state of standardization, and identifies open research challenges.
Journal ArticleDOI

Communication patterns in VANETs

TL;DR: This article collect and categorize envisioned applications from various sources and classify the unique network characteristics of vehicular networks, and proposes five distinct communication patterns that form the basis of almost all VANET applications.
Journal ArticleDOI

Secure vehicular communication systems: implementation, performance, and research challenges

TL;DR: The design of a VC security system that has emerged as a result of the European SeVe-Com project is discussed and an outlook on open security research issues that will arise as VC systems develop from today's simple prototypes to full-fledged systems is provided.
Proceedings ArticleDOI

Architecture for Secure and Private Vehicular Communications

TL;DR: This paper proposes a security architecture for VC that includes the management of identities and cryptographic keys, the security of communications, and the integration of privacy enhancing technologies.