메뉴 건너뛰기




Volumn , Issue , 2009, Pages 2213-2221

An efficient privacy-preserving scheme against traffic analysis attacks in network coding

Author keywords

Homomorphic encryption; Network coding; Privacy preservation; Traffic analysis

Indexed keywords

CRITICAL ISSUES; ENCODED PACKETS; HIGH PROBABILITY; HOMOMORPHIC ENCRYPTION; HOMOMORPHIC-ENCRYPTIONS; IN-NETWORK; NETWORK CODING; ONION ROUTING; PACKET FLOWS; PRIVACY PRESERVATION; PRIVACY PRESERVING; RANDOM CODING; TRAFFIC ANALYSIS; UNTRACEABILITY;

EID: 70349682315     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2009.5062146     Document Type: Conference Paper
Times cited : (86)

References (26)
  • 3
    • 33745135399 scopus 로고    scopus 로고
    • On Achieving Maximum Multicast Throughput in Undirected Networks
    • Jun
    • Z. Li, B. Li, and L.C. Lau, "On Achieving Maximum Multicast Throughput in Undirected Networks", IEEE Trans. on Information Theory, vol. 52, no. 6, pp. 2467-2485, Jun. 2006.
    • (2006) IEEE Trans. on Information Theory , vol.52 , Issue.6 , pp. 2467-2485
    • Li, Z.1    Li, B.2    Lau, L.C.3
  • 4
    • 28844481518 scopus 로고    scopus 로고
    • Minimum-Energy Multicast in Mobile Ad Hoc Networks using Network Coding
    • Nov
    • Y. Wu, P. A. Chou, and S.-Y. Kung, "Minimum-Energy Multicast in Mobile Ad Hoc Networks using Network Coding", IEEE Trans. on Communications, vol. 53, no. 11, pp. 1906-1918, Nov. 2005.
    • (2005) IEEE Trans. on Communications , vol.53 , Issue.11 , pp. 1906-1918
    • Wu, Y.1    Chou, P.A.2    Kung, S.-Y.3
  • 5
    • 70349700506 scopus 로고    scopus 로고
    • P. A. Chou and Y. Wu. Network Coding for the Internet and Wireless Networks, MSR-TR-2007-70, Microsoft Research, Jun. 2007.
    • P. A. Chou and Y. Wu. "Network Coding for the Internet and Wireless Networks", MSR-TR-2007-70, Microsoft Research, Jun. 2007.
  • 6
    • 36348977584 scopus 로고    scopus 로고
    • Network Coding in Live Peer-to-Peer Streaming
    • M. Wang and B. Li, "Network Coding in Live Peer-to-Peer Streaming", IEEE Trans. On Multimedia, Vol. 9, No. 8, pp. 1554-1567, 2007
    • (2007) IEEE Trans. On Multimedia , vol.9 , Issue.8 , pp. 1554-1567
    • Wang, M.1    Li, B.2
  • 7
    • 34548355193 scopus 로고    scopus 로고
    • Location-Aware Security Services for Wireless Sensor Networks Using Network Coding
    • E. Ayday, F. Delgosha, and F. Fekri, "Location-Aware Security Services for Wireless Sensor Networks Using Network Coding", Proc. IEEE INFOCOM'07, pp. 1226-1234, 2007.
    • (2007) Proc. IEEE INFOCOM'07 , pp. 1226-1234
    • Ayday, E.1    Delgosha, F.2    Fekri, F.3
  • 10
    • 51349130622 scopus 로고    scopus 로고
    • An Efficient Signature-based Scheme for Securing Network Coding against Pollution Attacks
    • Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An Efficient Signature-based Scheme for Securing Network Coding against Pollution Attacks", Proc. of IEEE INFOCOM, 2008.
    • (2008) Proc. of IEEE INFOCOM
    • Yu, Z.1    Wei, Y.2    Ramkumar, B.3    Guan, Y.4
  • 12
    • 0034447260 scopus 로고    scopus 로고
    • A Protocol for Anonymous Communication over the Internet
    • C. Shields and B. N. Levine, "A Protocol for Anonymous Communication over the Internet", Proc. of ACM CCS'00, pp. 33-42, 2000.
    • (2000) Proc. of ACM CCS'00 , pp. 33-42
    • Shields, C.1    Levine, B.N.2
  • 15
    • 0005063385 scopus 로고    scopus 로고
    • Onion Routing for Anonymous and Private Internet Connections
    • Feb
    • D. Goldschlag, M. Reed, and P. Syverson, "Onion Routing for Anonymous and Private Internet Connections", Communications of the ACM, Vol. 42, No. 2, pp. 39-41, Feb. 1999.
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 39-41
    • Goldschlag, D.1    Reed, M.2    Syverson, P.3
  • 20
    • 84942550998 scopus 로고    scopus 로고
    • Public-Key Cryptosystems Based on Composite Degree Residuocity Classes
    • Proc. of EUROCRYPT'99
    • P. Paillier, "Public-Key Cryptosystems Based on Composite Degree Residuocity Classes", Proc. of EUROCRYPT'99, LNCS, vol. 1592, pp. 223-238, 1999.
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 22
    • 51349086896 scopus 로고    scopus 로고
    • Towards Statistically Strong Source Anonymity for Sensor Networks
    • M. Shao, Y. Yang, S. Zhu, and G. Cao, "Towards Statistically Strong Source Anonymity for Sensor Networks", Proc. IEEE INFOCOM'08, pp. 51-55, 2008.
    • (2008) Proc. IEEE INFOCOM'08 , pp. 51-55
    • Shao, M.1    Yang, Y.2    Zhu, S.3    Cao, G.4
  • 23
    • 38549121414 scopus 로고    scopus 로고
    • ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks
    • X. Lin, R. Lu, H. Zhu, P.-H. Ho, X. Shen and Z. Cao, "ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks", Proc. IEEE ICC'07, 2007.
    • Proc. IEEE , vol.199 , Issue.7 , pp. 2007
    • Lin, X.1    Lu, R.2    Zhu, H.3    Ho, P.-H.4    Shen, X.5    Cao, Z.6
  • 24
    • 35449007284 scopus 로고    scopus 로고
    • Preserving Location Privacy in Wireless LANs
    • T. Jiang, H. J. Wang, and Y.-C. Hu, "Preserving Location Privacy in Wireless LANs", Proc. ACM MobiSys'07, pp. 246-257, 2007.
    • (2007) Proc. ACM MobiSys'07 , pp. 246-257
    • Jiang, T.1    Wang, H.J.2    Hu, Y.-C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.