-
1
-
-
0033296116
-
Untraceable mobility or how to travel incognito
-
G. Ateniese, A. Herzberg, H. Krawczyk, and G. Tsudik. Untraceable Mobility or How to Travel Incognito. Computer Networks, 31(8):871-884, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.8
, pp. 871-884
-
-
Ateniese, G.1
Herzberg, A.2
Krawczyk, H.3
Tsudik, G.4
-
5
-
-
3042778324
-
Stochastic properties of the random waypoint mobility model
-
C. Bettstetter, H. Hartenstein, and X. Perez-Costa. Stochastic Properties of the Random Waypoint Mobility Model. ACM/Kluwer Wireless Networks, Special Issue on Modeling and Analysis of Mobile Networks, 10(5):555-567, 2004.
-
(2004)
ACM/Kluwer Wireless Networks, Special Issue on Modeling and Analysis of Mobile Networks
, vol.10
, Issue.5
, pp. 555-567
-
-
Bettstetter, C.1
Hartenstein, H.2
Perez-Costa, X.3
-
7
-
-
20544471574
-
SDAR: A secure distributed anonymous routing protocol for wireless and mobile ad hoc networks
-
A. Boukerche, K. El-Khatib, L. Xu, and L. Korba. SDAR: A Secure Distributed Anonymous Routing Protocol for Wireless and Mobile Ad Hoc Networks. In 29th IEEE International Conference on Local Computer Networks (LCN'04), pages 618-624, 2004.
-
(2004)
29th IEEE International Conference on Local Computer Networks (LCN'04)
, pp. 618-624
-
-
Boukerche, A.1
El-Khatib, K.2
Xu, L.3
Korba, L.4
-
8
-
-
77953853641
-
Shake them up (A mouvement-based pairing protocol for CPU-constrained devices)
-
C. Castelluccia and P. Mutaf. Shake Them Up (A mouvement-based pairing protocol for CPU-constrained devices). In ACM/Usenix MobiSys, 2005.
-
(2005)
ACM/Usenix MobiSys
-
-
Castelluccia, C.1
Mutaf, P.2
-
9
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84-88, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.L.1
-
10
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
D. L. Chaum. The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. Journal of Cryptology, 1(1):65-75, 1988.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.L.1
-
12
-
-
0010275933
-
-
W. Dai. PipeNet 1.1. http://www.eskimo.com/~weidai/pipenet.txt, 1996.
-
(1996)
PipeNet 1.1
-
-
Dai, W.1
-
14
-
-
84957800033
-
Towards measuring anonymity
-
R. Dingledine and P. Syverson, editors
-
C. Díaz, S. Seys, J. Claessens, and B. Preneel. Towards measuring anonymity. In R. Dingledine and P. Syverson, editors, Proceedings of Privacy Enhancing Technologies Workshop (PET 2002), Lecture Notes in Computer Science 2482, pages 54-68, 2002.
-
(2002)
Proceedings of Privacy Enhancing Technologies Workshop (PET 2002), Lecture Notes in Computer Science
, vol.2482
, pp. 54-68
-
-
Díaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
16
-
-
1242310099
-
A delay-tolerant network architecture for challenged internets
-
K. Fall. A Delay-Tolerant Network Architecture for Challenged Internets. In ACM SIGCOMM, pages 27-34, 2003.
-
(2003)
ACM SIGCOMM
, pp. 27-34
-
-
Fall, K.1
-
17
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
M. Gruteser and D. Grunwald. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In MobiSys03, 2003.
-
(2003)
MobiSys03
-
-
Gruteser, M.1
Grunwald, D.2
-
18
-
-
34247389249
-
A framework for location privacy in wireless networks
-
Y.-C. Hu and H. J. Wang. A Framework for Location Privacy in Wireless Networks. In ACM SIGCOMM Asia Workshop, 2005.
-
(2005)
ACM SIGCOMM Asia Workshop
-
-
Hu, Y.-C.1
Wang, H.J.2
-
21
-
-
85086492602
-
Flexible-wing-based micro air vehicles
-
P. G. Ifju, S. M. Ettinger, D. Jenkins, Y. Lian, W. Shyy, and M. Waszak. Flexible-wing-based Micro Air Vehicles. In 40th AIAA Aerospace Sciences Meeting, 2002.
-
(2002)
40th AIAA Aerospace Sciences Meeting
-
-
Ifju, P.G.1
Ettinger, S.M.2
Jenkins, D.3
Lian, Y.4
Shyy, W.5
Waszak, M.6
-
23
-
-
84885904718
-
Formal notions of anonymity for peer-to-peer networks
-
IACR Cryptology ePrint Archive, May Also CSD-TR050014, Department of Computer Science, UCLA
-
J. Kong. Formal Notions of Anonymity for Peer-to-peer Networks. Technical Report Report 2005/132, IACR Cryptology ePrint Archive, May 2005. Also CSD-TR050014, Department of Computer Science, UCLA.
-
(2005)
Technical Report Report
, vol.2005
, Issue.132
-
-
Kong, J.1
-
24
-
-
1542377713
-
ESCORT: A decentralized and localized access control system for mobile wireless access to secured domains
-
J. Kong, S. Das, E. Tsai, and M. Gerla. ESCORT: A Decentralized and Localized Access Control System for Mobile Wireless Access to Secured Domains. In ACM WiSe'03 in conjunction with MOBICOM'03, pages 51-60, 2003.
-
(2003)
ACM WiSe'03 in Conjunction with MOBICOM'03
, pp. 51-60
-
-
Kong, J.1
Das, S.2
Tsai, E.3
Gerla, M.4
-
25
-
-
0242696170
-
ANODR: ANonymous on demand routing with untraceable routes for mobile ad-hoc networks
-
J. Kong and X. Hong. ANODR: ANonymous On Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks. In ACM MOBIHOC'03, pages 291-302, 2003.
-
(2003)
ACM MOBIHOC'03
, pp. 291-302
-
-
Kong, J.1
Hong, X.2
-
27
-
-
14844303406
-
Source-location privacy in energy-constrained sensor network routing
-
C. Ozturk, Y. Zhang, and W. Trappe. Source-Location Privacy in Energy-Constrained Sensor Network Routing. In ACM SASN, pages 88-93, 2004.
-
(2004)
ACM SASN
, pp. 88-93
-
-
Ozturk, C.1
Zhang, Y.2
Trappe, W.3
-
28
-
-
0030412572
-
Mobility support in IPv6
-
C. Perkins and D. Johnson. Mobility Support in IPv6. In ACM MOBICOM, pages 27-37, 1996.
-
(1996)
ACM MOBICOM
, pp. 27-37
-
-
Perkins, C.1
Johnson, D.2
-
30
-
-
84937564790
-
Anonymity, unobservability, and pseudonymity - A proposal for terminology
-
H. Federrath, editor
-
A. Pfitzmann and M. Köhntopp. Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology. In H. Federrath, editor, DIAU'00, Lecture Notes in Computer Science 2009, pages 1-9, 2000.
-
(2000)
DIAU'00, Lecture Notes in Computer Science
, vol.2009
, pp. 1-9
-
-
Pfitzmann, A.1
Köhntopp, M.2
-
32
-
-
84937555451
-
Networks without user observability: Design options
-
F. Pichler, editor
-
A. Pfitzmann and M. Waidner. Networks Without User Observability: Design Options. In F. Pichler, editor, EUROCRYPT'85, Lecture Notes in Computer Science 219, pages 245-253, 1986.
-
(1986)
EUROCRYPT'85, Lecture Notes in Computer Science
, vol.219
, pp. 245-253
-
-
Pfitzmann, A.1
Waidner, M.2
-
36
-
-
0141761240
-
An analysis of the node spatial distribution of the random waypoint model for ad hoc networks
-
G. Resta and P. Santi. An Analysis of the Node Spatial Distribution of the Random Waypoint Model for Ad Hoc Networks. In ACM Workshop on Principles of Mobile Computing (POMC), pages 44-50, 2002.
-
(2002)
ACM Workshop on Principles of Mobile Computing (POMC)
, pp. 44-50
-
-
Resta, G.1
Santi, P.2
-
37
-
-
0029451888
-
Untraceability in mobile networks
-
D. Samfat, R. Molva, and N. Asokan. Untraceability in Mobile Networks. In ACM MOBICOM, pages 26-36, 1995.
-
(1995)
ACM MOBICOM
, pp. 26-36
-
-
Samfat, D.1
Molva, R.2
Asokan, N.3
-
38
-
-
84957802536
-
Towards an information theoretic metric for anonymity
-
R. Dingledine and P. Syverson, editors
-
A. Serjantov and G. Danezis. Towards an Information Theoretic Metric for Anonymity. In R. Dingledine and P. Syverson, editors, Proceedings of Privacy Enhancing Technologies Workshop (PET 2002), Lecture Notes in Computer Science 2482, pages 41-53, 2002.
-
(2002)
Proceedings of Privacy Enhancing Technologies Workshop (PET 2002), Lecture Notes in Computer Science
, vol.2482
, pp. 41-53
-
-
Serjantov, A.1
Danezis, G.2
-
40
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon. Communication Theory of Secrecy Systems. Bell System Technical Journal, 28(4):656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
43
-
-
14844282596
-
K-anonymous message transmission
-
V. Atluri and P. Liu, editors
-
L. von Ahn, A. Bortz, and N. J. Hopper. k-Anonymous Message Transmission. In V. Atluri and P. Liu, editors, 10th ACM Conference on Computer and Communications Security (CCS 2003), pages 122-130, 2003.
-
(2003)
10th ACM Conference on Computer and Communications Security (CCS 2003)
, pp. 122-130
-
-
Von Ahn, L.1
Bortz, A.2
Hopper, N.J.3
-
45
-
-
14844289583
-
K-anonymous secret handshakes with reusable credentials
-
S. Xu and M. Yung. k-Anonymous Secret Handshakes with Reusable Credentials. In ACM CCS, pages 158-159, 2004.
-
(2004)
ACM CCS
, pp. 158-159
-
-
Xu, S.1
Yung, M.2
-
46
-
-
25844443821
-
Anonymous communications in mobile ad hoc networks
-
Y. Zhang, W. Liu, and W. Lou. Anonymous Communications in Mobile Ad Hoc Networks. In IEEE INFOCOM, 2005.
-
(2005)
IEEE INFOCOM
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
|