메뉴 건너뛰기




Volumn , Issue , 2008, Pages 258-267

PRISM: Privacy-friendly routing in suspicious MANETs (and VANETs)

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION PARADIGM; COMMUNICATION SECURITY; COMPUTATIONALLY EFFICIENT; DISASTER RECOVERY; EMERGENCY RESCUE; LOCATION BASED; ON-DEMAND; PRIVACY AND SECURITY; PRIVACY ASPECTS;

EID: 67249139271     PISSN: 10921648     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICNP.2008.4697044     Document Type: Conference Paper
Times cited : (34)

References (29)
  • 1
    • 35148864700 scopus 로고    scopus 로고
    • Wimax- potential commercial off-theshelf solution for tactical mobile mesh communications
    • B. Hartzog and T. Brown, "Wimax- potential commercial off-theshelf solution for tactical mobile mesh communications," Milcom, 2006.
    • (2006) Milcom
    • Hartzog, B.1    Brown, T.2
  • 3
    • 33845564340 scopus 로고    scopus 로고
    • Securing vehicular communications
    • DOI 10.1109/WC-M.2006.250352
    • M. Raya, P. Papadimitratos, and J. Hubaux, "Securing vehicular communications," IEEE Wireless Comm. Magazine, vol.13, no. 5, pp. 8-15, 2006. (Pubitemid 44934142)
    • (2006) IEEE Wireless Communications , vol.13 , Issue.5 , pp. 8-15
    • Raya, M.1    Papadimitratos, P.2    Hubaux, J.-P.3
  • 4
    • 2442551009 scopus 로고    scopus 로고
    • Optimized link state routing protocol (olsr)
    • T. Clausen and P. Jacquet, "Optimized link state routing protocol (olsr)," IETF RFC 3626, 2003.
    • (2003) IETF RFC 3626
    • Clausen, T.1    Jacquet, P.2
  • 5
    • 34347349933 scopus 로고    scopus 로고
    • Ad-hoc on-demand distance vector routing
    • C. Perkins and E. Royer, "Ad-hoc on-demand distance vector routing," IEEE WMCSA, 1999.
    • (1999) IEEE WMCSA
    • Perkins, C.1    Royer, E.2
  • 6
    • 67249133693 scopus 로고    scopus 로고
    • Alarm: Anonymous locationaided routing in suspicious manets
    • K. El Defrawy and G. Tsudik, "Alarm: Anonymous locationaided routing in suspicious manets," IEEE ICNP, 2007.
    • (2007) IEEE ICNP
    • El Defrawy, K.1    Tsudik, G.2
  • 7
    • 4544304744 scopus 로고    scopus 로고
    • The sybil attack
    • J. R. Douceur, "The sybil attack," IPTPS, 2001.
    • (2001) IPTPS
    • Douceur, J.R.1
  • 8
    • 38049094878 scopus 로고    scopus 로고
    • Privacy-preserving set operations
    • L. Kissner and D. Song, "Privacy-preserving set operations," CRYPTO, 2005.
    • (2005) CRYPTO
    • Kissner, L.1    Song, D.2
  • 9
    • 33749514463 scopus 로고    scopus 로고
    • Srdp: Securing route discovery in dsr
    • J. Kim and G. Tsudik, "Srdp: Securing route discovery in dsr," MobiQuitous, 2005.
    • (2005) MobiQuitous
    • Kim, J.1    Tsudik, G.2
  • 10
    • 17444426121 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • DOI 10.1007/s11276-004-4744-y
    • Y.-C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," Wirel. Netw., vol.11, no. 1-2, pp. 21-38, 2005. (Pubitemid 40536374)
    • (2005) Wireless Networks , vol.11 , Issue.1-2 , pp. 21-38
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 13
    • 6344227625 scopus 로고    scopus 로고
    • Secure position-aided ad hoc routing
    • S. Carter and A. Yasinsac, "Secure position-aided ad hoc routing," CCN, 2002.
    • (2002) CCN
    • Carter, S.1    Yasinsac, A.2
  • 17
    • 0242696170 scopus 로고    scopus 로고
    • Anodr: Anonymous on demand routing with untraceable routes for mobile ad-hoc networks
    • J. Kong and X. Hong, "Anodr: anonymous on demand routing with untraceable routes for mobile ad-hoc networks," MobiHoc, 2003.
    • (2003) MobiHoc
    • Kong, J.1    Hong, X.2
  • 18
    • 50049110705 scopus 로고    scopus 로고
    • Discount anonymous on demand routing for mobile ad hoc networks
    • M. J. L. Yang and S. Wetzel, "Discount anonymous on demand routing for mobile ad hoc networks," SECURECOMM, 2006.
    • (2006) SECURECOMM
    • Yang, M.J.L.1    Wetzel, S.2
  • 20
    • 39049114200 scopus 로고    scopus 로고
    • Distributed anonymous secure routing protocol in wireless mobile ad hoc networks
    • Y. Cheng and D. Agrawal, "Distributed anonymous secure routing protocol in wireless mobile ad hoc networks," OPNETWORK, 2005.
    • (2005) OPNETWORK
    • Cheng, Y.1    Agrawal, D.2
  • 21
    • 67249117045 scopus 로고    scopus 로고
    • Odar: On-demand anonymous routing in ad hoc networks
    • D. Sy, R. Chen, and L. Bao, "Odar: On-demand anonymous routing in ad hoc networks," IEEE MASS, 2006.
    • (2006) IEEE MASS
    • Sy, D.1    Chen, R.2    Bao, L.3
  • 22
    • 18944373619 scopus 로고    scopus 로고
    • An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks
    • A. Boukerche and K. E.-K. et al., "An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks," Elsevier Computer Communications, 2005.
    • (2005) Elsevier Computer Communications
    • Boukerche, A.K.E.-K.1
  • 24
  • 27
    • 24944577209 scopus 로고    scopus 로고
    • Signature schemes and anonymous credentials from bilinear maps
    • J. Camenisch and A. Lysyanskaya, "Signature schemes and anonymous credentials from bilinear maps," CRYPTO, 2004.
    • (2004) CRYPTO
    • Camenisch, J.1    Lysyanskaya, A.2
  • 28
    • 67249091868 scopus 로고    scopus 로고
    • Leak-free group signatures with immediate revocation
    • X. Ding, G. Tsudik, and S. Xu, "Leak-free group signatures with immediate revocation," IEEE ICDCS, 2004.
    • (2004) IEEE ICDCS
    • Ding, X.1    Tsudik, G.2    Xu, S.3
  • 29
    • 67249124250 scopus 로고    scopus 로고
    • An efficient group signature scheme from bilinear maps
    • J. Furukawa and H. Imai, "An efficient group signature scheme from bilinear maps," IEICE TFECCS, 2005.
    • (2005) IEICE TFECCS
    • Furukawa, J.1    Imai, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.