-
1
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM, 24(2):84-90, 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.L.1
-
4
-
-
35048866963
-
A methodological assessment of location privacy risks in wireless hotspot networks
-
Germany, March 12-14
-
M. Gruteser and D. Grunwald. A methodological assessment of location privacy risks in wireless hotspot networks. In SPC'03: First International Conference on Security in Pervasive Computing, Boppard, Germany, volume 2802, pages 10-24, March 12-14 2003.
-
(2003)
SPC'03: First International Conference on Security in Pervasive Computing, Boppard
, vol.2802
, pp. 10-24
-
-
Gruteser, M.1
Grunwald, D.2
-
5
-
-
34848852681
-
Temporal privacy in wireless sensor networks
-
Toronto, Ontario, Canada
-
P. Kamat, W. Xu, W. Trappe, and Y. Zhang. Temporal privacy in wireless sensor networks. In Proceedings of 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), June 25-29, 2007, Toronto, Ontario, Canada, 2007.
-
(2007)
Proceedings of 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), June 25-29, 2007
-
-
Kamat, P.1
Xu, W.2
Trappe, W.3
Zhang, Y.4
-
6
-
-
27944449345
-
Enhancing source-location privacy in sensor network routing
-
P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk. Enhancing source-location privacy in sensor network routing. In ICDCS '05: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, pages 599-608, 2005.
-
(2005)
ICDCS '05: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
, pp. 599-608
-
-
Kamat, P.1
Zhang, Y.2
Trappe, W.3
Ozturk, C.4
-
10
-
-
33845942290
-
Entrapping adversaries for source protection in sensor networks
-
Y. Ouyang, Z. Le, G. Chen, J. Ford, and F. Makedon. Entrapping adversaries for source protection in sensor networks. In WOWMOM '06: Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks, pages 23-34, 2006.
-
(2006)
WOWMOM '06: Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
, pp. 23-34
-
-
Ouyang, Y.1
Le, Z.2
Chen, G.3
Ford, J.4
Makedon, F.5
-
13
-
-
51349086896
-
Towards statistically strong source anonymity for sensor networks
-
M. Shao, Y. Yang, S. Zhu, and G. Cao. Towards statistically strong source anonymity for sensor networks. In INFOCOM 2008: Proceedings of the 27th IEEE Conference on Computer Communications, pages 51-55, 2008.
-
(2008)
INFOCOM 2008: Proceedings of the 27th IEEE Conference on Computer Communications
, pp. 51-55
-
-
Shao, M.1
Yang, Y.2
Zhu, S.3
Cao, G.4
-
14
-
-
56749163645
-
Towards event source unobservability with minimum network traffic in sensor networks
-
Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao. Towards event source unobservability with minimum network traffic in sensor networks. In WiSec '08: Proceedings of the first ACM conference on Wireless network security, pages 77-88, 2008.
-
(2008)
WiSec '08: Proceedings of the first ACM conference on Wireless network security
, pp. 77-88
-
-
Yang, Y.1
Shao, M.2
Zhu, S.3
Urgaonkar, B.4
Cao, G.5
|