-
2
-
-
33947644846
-
Whopay: A scalable and anonymous payment system for peer-to-peer environments
-
July
-
K. Wei, Y. R. Chen, A. J. Smith, and B. Vo, "Whopay: A scalable and anonymous payment system for peer-to-peer environments," hoc. IEEE Intl. Conf. on Distributed Computing Systems, ICDCS, July 2006.
-
(2006)
hoc. IEEE Intl. Conf. on Distributed Computing Systems, ICDCS
-
-
Wei, K.1
Chen, Y.R.2
Smith, A.J.3
Vo, B.4
-
3
-
-
84944878354
-
-
Boca Raton, CRC Press
-
A. Menezes, P. V. Oorschot, and S. Vanston, Handbook of Applied Cryptography, Boca Raton, CRC Press, 1996.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Oorschot, P.V.2
Vanston, S.3
-
4
-
-
51349128118
-
-
European Telecommunications Standards Institute (ETSI), GSM 2.09: Security Aspects., June 1993.
-
European Telecommunications Standards Institute (ETSI), "GSM 2.09: Security Aspects.," June 1993.
-
-
-
-
5
-
-
85008044268
-
Selfish MAC layer misbehavior in wireless networks
-
Sept
-
P. Kyasanur and N. H. Vaidya, "Selfish MAC layer misbehavior in wireless networks," IEEE Trans. Mobile Computing, vol. 4, no. 5, pp. 502-516, Sept. 2005.
-
(2005)
IEEE Trans. Mobile Computing
, vol.4
, Issue.5
, pp. 502-516
-
-
Kyasanur, P.1
Vaidya, N.H.2
-
6
-
-
4243082091
-
Security in wireless sensor networks
-
A. Perrig, J. Stankovic, and D. Wagner, "Security in wireless sensor networks," Comm. of the ACM, vol. 47, no. 6, pp. 53-57, 2004.
-
(2004)
Comm. of the ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
7
-
-
33847120377
-
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
-
Nov
-
S. Zhu, S. Setia, and S. Jajodia, "LEAP+: Efficient security mechanisms for large-scale distributed sensor networks," ACM Trans. Sensor Networks, vol. 2, no. 4, pp. 500-528, Nov. 2006.
-
(2006)
ACM Trans. Sensor Networks
, vol.2
, Issue.4
, pp. 500-528
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
8
-
-
51349106487
-
A Survey on Wireless Security in Mobile Ad Hoc Networks: Challenges and Possible Solutions
-
edited by X. Chen, X. Huang and D.-Z. Du
-
W. Lou and Y. Fang, A Survey on Wireless Security in Mobile Ad Hoc Networks: Challenges and Possible Solutions, edited by X. Chen, X. Huang and D.-Z. Du, Kluwer Academic Publishers/Springer, 2004.
-
(2004)
Kluwer Academic Publishers/Springer
-
-
Lou, W.1
Fang, Y.2
-
9
-
-
0033357103
-
Securing ad hoc networks
-
Dec
-
L. Zhou and Z. J. Haas, "Securing ad hoc networks," IEEE Network Magazine, vol. 13, no. 6, pp. 24-30, Dec. 1999.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
10
-
-
33845726678
-
Securing vehicular ad hoc networks
-
M. Raya and J-P. Hubaux, "Securing vehicular ad hoc networks," Journal of Computer Security, Special Issue on Security of Ad Hoc and Sensor Networks, vol. 15, no. 1, pp. 39-68, 2007.
-
(2007)
Journal of Computer Security, Special Issue on Security of Ad Hoc and Sensor Networks
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.-P.2
-
12
-
-
33749856769
-
ARSA: An attack-resilient security architecture for multihop wireless mesh networks
-
Oct
-
Y. Zhang and Y. Fang, "ARSA: An attack-resilient security architecture for multihop wireless mesh networks," IEEE J. Select. Areas Communications, vol. 24, no. 10, pp. 1916-1928, Oct. 2006.
-
(2006)
IEEE J. Select. Areas Communications
, vol.24
, Issue.10
, pp. 1916-1928
-
-
Zhang, Y.1
Fang, Y.2
-
13
-
-
13844296355
-
Wireless mesh networks: A survey
-
Mar
-
I. F. Akyildiz, X. Wang, and W. Wang, "Wireless mesh networks: a survey," Comput. Netw., vol. 47, no. 4, pp. 445-487, Mar. 2005.
-
(2005)
Comput. Netw
, vol.47
, Issue.4
, pp. 445-487
-
-
Akyildiz, I.F.1
Wang, X.2
Wang, W.3
-
15
-
-
33750966304
-
Incentives to promote availability in peer-to-peer anonymity systems
-
Nov
-
D. Figueiredo, J. Shapiro, and D. Towsley, "Incentives to promote availability in peer-to-peer anonymity systems," in Proc. IEEE Int'l Conf. on Network Protocols, ICNP, pp. 110-121, Nov. 2005.
-
(2005)
Proc. IEEE Int'l Conf. on Network Protocols, ICNP
, pp. 110-121
-
-
Figueiredo, D.1
Shapiro, J.2
Towsley, D.3
-
16
-
-
0033296116
-
Untraceable mobility or how to travel incognito
-
Apr
-
G. Ateniese, A. Herzberg, H. Krawczyk, and G. Tsudik, "Untraceable mobility or how to travel incognito," Comput. Netw., vol. 31, no. 8, pp. 871884, Apr. 1999.
-
(1999)
Comput. Netw
, vol.31
, Issue.8
, pp. 871884
-
-
Ateniese, G.1
Herzberg, A.2
Krawczyk, H.3
Tsudik, G.4
-
17
-
-
2542616812
-
Quest for personal control over mobile location privacy
-
May
-
Q. He, D. Wu, and P. Khosla, "Quest for personal control over mobile location privacy," IEEE Communications Magazine, vol. 42, no. 5, pp. 130-136, May 2004.
-
(2004)
IEEE Communications Magazine
, vol.42
, Issue.5
, pp. 130-136
-
-
He, Q.1
Wu, D.2
Khosla, P.3
-
19
-
-
33748622050
-
MASK: Anonymous on-demand routing in mobile ad hoc networks
-
Sept
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang, "MASK: Anonymous on-demand routing in mobile ad hoc networks," IEEE Trans. Wireless Communications, vol. 5, no. 9, pp. 2376-2385, Sept. 2006.
-
(2006)
IEEE Trans. Wireless Communications
, vol.5
, Issue.9
, pp. 2376-2385
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
21
-
-
0032074579
-
Anonymous connections and onion routing
-
May
-
M. G. Reed, P. F. Syverson, and D. M. Goldschlag, "Anonymous connections and onion routing," IEEE J. Select. Areas Communications, vol. 16, no. 4, pp. 482494, May 1998.
-
(1998)
IEEE J. Select. Areas Communications
, vol.16
, Issue.4
, pp. 482494
-
-
Reed, M.G.1
Syverson, P.F.2
Goldschlag, D.M.3
-
22
-
-
85084161366
-
Tor: The second-generation onion router
-
Aug
-
R. Dingledine, N. Mathewson, and P. Syverson, "Tor: The second-generation onion router," in Proc. of The 13th USENIX Security Symposium, p. 303320, Aug. 2004.
-
(2004)
Proc. of The 13th USENIX Security Symposium
, pp. 303320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
24
-
-
33751529199
-
Securing mobile ad hoc networks with certificateless public keys
-
Oct
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Securing mobile ad hoc networks with certificateless public keys," IEEE Trans. Dependable and Secure Computing, vol. 3, no. 4, pp. 386-399, Oct. 2006.
-
(2006)
IEEE Trans. Dependable and Secure Computing
, vol.3
, Issue.4
, pp. 386-399
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
25
-
-
84946840347
-
Identity-based encryption from the weil pairings, Advances in Cryptology-Asiacrypt 2001
-
Springer-Verlag
-
D. Boneh and M. Franklin, Identity-based encryption from the weil pairings, Advances in Cryptology-Asiacrypt 2001, LNCS 2248, pp. 514-532, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Franklin, M.2
-
26
-
-
84958591696
-
Security of blind digital signatures, Advances in Cryptology - CRYPTO '97
-
Springer- Verlag
-
A. Juels, M. Luby, and R. Ostrovsky, Security of blind digital signatures, Advances in Cryptology - CRYPTO '97, LNCS 1294, pp. 150-164, Springer- Verlag. 1997.
-
(1997)
LNCS
, vol.1294
, pp. 150-164
-
-
Juels, A.1
Luby, M.2
Ostrovsky, R.3
-
27
-
-
0010280770
-
An efficient off-line electronic cash system based on the representation problem
-
CS-R9323, 1993
-
S. Brands. An efficient off-line electronic cash system based on the representation problem, CWI Technical Report CS-R9323, 1993.
-
CWI Technical Report
-
-
Brands, S.1
-
28
-
-
84974652864
-
Provably secure partially blind signatures, Advances in Cryptology - Crypto 2000
-
Springer-Verlag
-
M. Abe and T. Okamoto, Provably secure partially blind signatures, Advances in Cryptology - Crypto 2000. LNCS 1880, no. 271-286, Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1880
, Issue.271-286
-
-
Abe, M.1
Okamoto, T.2
-
29
-
-
26444573086
-
Two improved partially blind signature schemes from bilinear pairings
-
ACISP, Springer-Verlag
-
S. M. Chow, C. K. Hui, S. M. Yiu, and K. P. Chow. Two improved partially blind signature schemes from bilinear pairings. ACISP 2005, LNCS 3574, pp. 316-328, Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3574
, pp. 316-328
-
-
Chow, S.M.1
Hui, C.K.2
Yiu, S.M.3
Chow, K.P.4
-
30
-
-
84958951205
-
A provably secure restrictive partially blind signature scheme
-
Springer-Verlag
-
G. Maitland and C. Boyd, A provably secure restrictive partially blind signature scheme, LNCS 2274, pp. 99-114, Springer-Verlag. 2002.
-
(2002)
LNCS
, vol.2274
, pp. 99-114
-
-
Maitland, G.1
Boyd, C.2
-
31
-
-
33750051030
-
Efficient provably secure restrictive partially blind signatures from bilinear pairings
-
Feb
-
X. Chen, F. Zhang, Y. Mu, and W. Susilo, "Efficient provably secure restrictive partially blind signatures from bilinear pairings," Proc. 10th Conf. on Financial Cryptography and Data Security, FC 2006, no. 251-265, Feb. 2006.
-
(2006)
Proc. 10th Conf. on Financial Cryptography and Data Security, FC 2006
, Issue.251-265
-
-
Chen, X.1
Zhang, F.2
Mu, Y.3
Susilo, W.4
-
32
-
-
33846050393
-
ID-based restrictive partially blind signatures and applications
-
Feb
-
X. Chen, F. Zhang, and S. Liu, "ID-based restrictive partially blind signatures and applications," Journal of Systems and Software, vol. 80, no. 2, pp. 164-171, Feb. 2007.
-
(2007)
Journal of Systems and Software
, vol.80
, Issue.2
, pp. 164-171
-
-
Chen, X.1
Zhang, F.2
Liu, S.3
-
33
-
-
70349557354
-
Hierarchical id-based cryptography
-
Dec
-
C. Gentry and A. Silverberg, "Hierarchical id-based cryptography," Proc. ASIACRYPT, pp. 548-556, Dec. 2002.
-
(2002)
Proc. ASIACRYPT
, pp. 548-556
-
-
Gentry, C.1
Silverberg, A.2
-
34
-
-
35248867510
-
Efficient identity-based signature schemes based on pairings
-
SAC, Springer-Verlag
-
F. Hess, Efficient identity-based signature schemes based on pairings. SAC 2002, LNCS 2595, pp. 310-324. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2595
, pp. 310-324
-
-
Hess, F.1
-
35
-
-
51349160979
-
-
R. Dutta, R. Barua, and P. Sarkar. Pairing-based cryptography: a survey, Cryptology ePrint Archive, Report 2004/064, available at http://eprint.iacr.org/2004/064.pdf, 2004.
-
R. Dutta, R. Barua, and P. Sarkar. Pairing-based cryptography: a survey, Cryptology ePrint Archive, Report 2004/064, available at http://eprint.iacr.org/2004/064.pdf, 2004.
-
-
-
-
36
-
-
51349158727
-
Anonymous secure communication in wireless mobile ad-hoc networks
-
Dec
-
S. M. M. Rahman, A. Inomata, T. Okamoto, M. Mambo, and E. Okamoto, "Anonymous secure communication in wireless mobile ad-hoc networks," Proc. 1st Intl. Conf. on Ubiquitous Convergence Technology, pp. 131-140, Dec. 2006.
-
(2006)
Proc. 1st Intl. Conf. on Ubiquitous Convergence Technology
, pp. 131-140
-
-
Rahman, S.M.M.1
Inomata, A.2
Okamoto, T.3
Mambo, M.4
Okamoto, E.5
-
37
-
-
51349111697
-
Tor: An anonymous internet communication system
-
Apr
-
R. Dingledine, "Tor: An anonymous internet communication system," Workshop on Vanishing Anonymity, The 15th Conf. on Computers, Freedom, and Privacy, Apr. 2005.
-
(2005)
Workshop on Vanishing Anonymity, The 15th Conf. on Computers, Freedom, and Privacy
-
-
Dingledine, R.1
-
38
-
-
11244250305
-
The effect of rumor spreading in reputation systems for mobile ad-hoc networks
-
Mar
-
S. Buchegger and J. L. Boudec, "The effect of rumor spreading in reputation systems for mobile ad-hoc networks," in Proc. WiOpt'03, Mar. 2003.
-
(2003)
Proc. WiOpt'03
-
-
Buchegger, S.1
Boudec, J.L.2
-
40
-
-
0042933944
-
Sprite: A simple, cheat-proof, credit-based system for mobile ad hoc networks
-
5, Apr
-
5. Zhong, J. Chen, and Y. Yang, "Sprite: A simple, cheat-proof, credit-based system for mobile ad hoc networks," IEEE INFOCOM, vol. 3, pp. 1987-1997, Apr. 2003.
-
(2003)
IEEE INFOCOM
, vol.3
, pp. 1987-1997
-
-
Zhong, J.C.1
Yang, Y.2
|