메뉴 건너뛰기




Volumn , Issue , 2008, Pages

Traffic analysis in anonymous manets

Author keywords

MANETs; Privacy and anonymity; Traffic analysis

Indexed keywords

INTERSECTING FLOWS; MANETS; MOBILE AD-HOC NETWORKS; NODE MOVEMENTS; NODE TRANSMISSIONS; NON-INTRUSIVE; PACKET HEADERS; PRIVACY AND ANONYMITY; SOURCE NODES; TRACING METHODS; TRAFFIC ANALYSIS; UNDERLYING NETWORKS;

EID: 62349139142     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MILCOM.2008.4753404     Document Type: Conference Paper
Times cited : (9)

References (14)
  • 3
    • 49549085794 scopus 로고    scopus 로고
    • Detection of Information Flows
    • accepted to IEEE Trans. on Information Theory
    • T. He and L. Tong, "Detection of Information Flows." accepted to IEEE Trans. on Information Theory, 2008.
    • (2008)
    • He, T.1    Tong, L.2
  • 5
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses and digital pseudonyms
    • February
    • D. Chaum, "Untraceable electronic mail, return addresses and digital pseudonyms," Communications of the ACM, vol. 24, pp. 84-88, February 1981.
    • (1981) Communications of the ACM , vol.24 , pp. 84-88
    • Chaum, D.1
  • 6
    • 0242696170 scopus 로고    scopus 로고
    • Anodr: Anonymous on demand routing with untraceable routes for mobile ad-hoc networks
    • Annapolis, MD, June 1-3
    • J. Kong and X. Hong, "Anodr: Anonymous on demand routing with untraceable routes for mobile ad-hoc networks," in ACM International Symposium on Mobile Ad Hoc Nefworking and Computing, (Annapolis, MD), June 1-3 2003.
    • (2003) ACM International Symposium on Mobile Ad Hoc Nefworking and Computing
    • Kong, J.1    Hong, X.2
  • 7
    • 45249083605 scopus 로고    scopus 로고
    • P. Venkitasubramaniam, T. He, and L. Tong, Anonymous Networking amidst Eavesdroppers, IEEE Transactions on Information Theory, Special Issue on Information-Thoeretic Security, 54, pp. 2770-2784, June 2008.
    • P. Venkitasubramaniam, T. He, and L. Tong, "Anonymous Networking amidst Eavesdroppers," IEEE Transactions on Information Theory, Special Issue on Information-Thoeretic Security, vol. 54, pp. 2770-2784, June 2008.
  • 10
    • 44049102446 scopus 로고    scopus 로고
    • Detecting Information Flows: Improving Chaff Tolerance by Joint Detection
    • Baltimore, MD, March
    • T. He and L. Tong, "Detecting Information Flows: Improving Chaff Tolerance by Joint Detection," in Proc. 2007 Conference on Information Sciences and Systems, (Baltimore, MD), March 2007.
    • (2007) Proc. 2007 Conference on Information Sciences and Systems
    • He, T.1    Tong, L.2
  • 11
    • 17144371860 scopus 로고    scopus 로고
    • V. L. L. Thing and H. C. J. Lee, IP Traceback for Wireless Ad-hoc Networks, in Proc. 60th IEEE Vehicular Technology Conference, 5, (Los Angeles, CA), pp. 3286-3290, September 26-29 2004.
    • V. L. L. Thing and H. C. J. Lee, "IP Traceback for Wireless Ad-hoc Networks," in Proc. 60th IEEE Vehicular Technology Conference, vol. 5, (Los Angeles, CA), pp. 3286-3290, September 26-29 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.