« My Concerns with CyberSecurity Legislation – no teeth, paper audits, and “security” auditors | Main | Developing a Training ‘Program’: Not a One and Done Approach »

01/10/2012

Comments

Feed You can follow this conversation by subscribing to the comment feed for this post.

Miraj

Hi
I am writing a paper on vehicle to vehicle communication using wireless technology and my focus is on security issues
If you could guide me through any information on solutions to the security issues in V2V and the encryption mechanism to be used ....
Please mail me at mirajshah05@rediffmail.com

Thank You

Verify your Comment

Previewing your Comment

This is only a preview. Your comment has not yet been posted.

Working...
Your comment could not be posted. Error type:
Your comment has been saved. Comments are moderated and will not appear until approved by the author. Post another comment

The letters and numbers you entered did not match the image. Please try again.

As a final step before posting your comment, enter the letters and numbers you see in the image below. This prevents automated programs from posting comments.

Having trouble reading this image? View an alternate.

Working...

Post a comment

Comments are moderated, and will not appear until the author has approved them.

Subscribe Now!

Enter your email address:

Delivered by FeedBurner

Follow Us

Subscribe to the
Application Security Report!

 First Name * 
 Last Name * 
 Email * 

Other Featured Blogs

Dinis Cruz Blog, by Dinis Cruz

WhoIsJoe, by Joe Basirico

TeamMentor Development and Testing, by TeamMentor Developers

Serge Security, by Serge Truth