-
3
-
-
50249133191
-
Shining light in dark places: Understanding the Tor network
-
Leuven, Belgium, July
-
McCoy D, Bauer K, Grunwald D, Kohno T, Sicker D. Shining light in dark places: understanding the Tor network. Proceedings of the 8th International Symposium on Privacy Enhancing Technologies (PETS 2008), Leuven, Belgium, July 2008; 63-76.
-
(2008)
Proceedings of the 8th International Symposium on Privacy Enhancing Technologies (PETS 2008)
, pp. 63-76
-
-
McCoy, D.1
Bauer, K.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
4
-
-
27944485356
-
On flow marking attacks in wireless anonymous communication networks
-
Fu X, Zhu Y, Graham B, Bettati R, Zhao W. On flow marking attacks in wireless anonymous communication networks. Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS), 2005; 493-503.
-
(2005)
Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS)
, pp. 493-503
-
-
Fu, X.1
Zhu, Y.2
Graham, B.3
Bettati, R.4
Zhao, W.5
-
5
-
-
36749002169
-
Mutual authentication and key exchange protocols for roaming services in wireless mobile networks
-
Jiang Y, Lin C, Shen X, Shi M. Mutual authentication and key exchange protocols for roaming services in wireless mobile networks. IEEE Transactions on Wireless Communications 2006; 5(9): 2569-2577.
-
(2006)
IEEE Transactions on Wireless Communications
, vol.5
, Issue.9
, pp. 2569-2577
-
-
Jiang, Y.1
Lin, C.2
Shen, X.3
Shi, M.4
-
7
-
-
0346895307
-
Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems
-
Park C-S. Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems. Computer Networks 2004; 44(2): 267-273.
-
(2004)
Computer Networks
, vol.44
, Issue.2
, pp. 267-273
-
-
Park, C.-S.1
-
8
-
-
27944454864
-
Location privacy in mobile systems: A personalized anonymization model
-
Columbus, Ohio, USA, June
-
Gedik B, Liu L. Location privacy in mobile systems: a personalized anonymization model. Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, Columbus, Ohio, USA, June 2005; 620-629.
-
(2005)
Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
, pp. 620-629
-
-
Gedik, B.1
Liu, L.2
-
9
-
-
0347380855
-
Wireless location privacy protection
-
Schilit B, Hong J, Gruteser M. Wireless location privacy protection. Computer 2003; 36(12): 135-137.
-
(2003)
Computer
, vol.36
, Issue.12
, pp. 135-137
-
-
Schilit, B.1
Hong, J.2
Gruteser, M.3
-
11
-
-
33847256529
-
The devil and packet trace anonymization
-
Pang R, Allman M, Paxson V, Lee J. The devil and packet trace anonymization. ACM SIGCOM Computer Communication Review 2006; 36(1): 29-38.
-
(2006)
ACM SIGCOM Computer Communication Review
, vol.36
, Issue.1
, pp. 29-38
-
-
Pang, R.1
Allman, M.2
Paxson, V.3
Lee, J.4
-
13
-
-
37749006403
-
-
802.11 user fingerprinting, Montreal, Quebec, Canada
-
Pang J, Greenstein B, Gummadi R, Seshan S, Wetherall D. 802.11 user fingerprinting. Proceedings of 13th ACM International Conference on Mobile Computing and Networking, Montreal, Quebec, Canada, 2007; 99-110.
-
(2007)
Proceedings of 13th ACM International Conference on Mobile Computing and Networking
, pp. 99-110
-
-
Pang, J.1
Greenstein, B.2
Gummadi, R.3
Seshan, S.4
Wetherall, D.5
-
17
-
-
0003568551
-
-
November 1997; Available online at, http://www.csl.sri.com/users/millen/capsl/library.html
-
Clark J, Jacob J. A survey of authentication protocol literature: version 1.0. November 1997; Available online at: http://www.cs.york.ac.uk/jac/papers/drareview.ps.gz or http://www.csl.sri.com/users/millen/capsl/library.html
-
A survey of authentication protocol literature: Version 1.0
-
-
Clark, J.1
Jacob, J.2
-
18
-
-
84937570422
-
Self-certified public keys
-
Davies DW. (ed.). Springer-Verlag: Berlin, Germany
-
Girault M. Self-certified public keys. In Advance in Cryptology- -Proceeding of Eurocrypt' 91, Lecture Notes in computer Science, Vol. 547, No. 3 Davies DW. (ed.). Springer-Verlag: Berlin, Germany, 1991; 491-497.
-
(1991)
Advance in Cryptology- -Proceeding of Eurocrypt' 91, Lecture Notes in computer Science
, vol.547
, Issue.3
, pp. 491-497
-
-
Girault, M.1
-
19
-
-
33750133438
-
Security enhancement on a new authentication scheme with anonymity for wireless environments
-
Lee C-C, Hwang M-S, Liao I-E. Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics 2006; 53(5): 1683-1687.
-
(2006)
IEEE Transactions on Industrial Electronics
, vol.53
, Issue.5
, pp. 1683-1687
-
-
Lee, C.-C.1
Hwang, M.-S.2
Liao, I.-E.3
-
20
-
-
1942487780
-
A new authentication scheme with anonymity for wireless environments
-
Zhu J, Ma J. A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics 2004; 50(1): 231-235.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.1
, pp. 231-235
-
-
Zhu, J.1
Ma, J.2
-
21
-
-
70350217693
-
Cryptanalysis of Park's authentication protocol in wireless mobile communication systems
-
Dominguez AP. Cryptanalysis of Park's authentication protocol in wireless mobile communication systems. International Journal of Network Security 2006; 3(3): 279-282.
-
(2006)
International Journal of Network Security
, vol.3
, Issue.3
, pp. 279-282
-
-
Dominguez, A.P.1
-
22
-
-
26444495514
-
Kim K. Wireless authentication protocols preserving user anonymity
-
Oiso, Japan, 23-26 January
-
Go J, Kim K. Wireless authentication protocols preserving user anonymity. Proceedings of the 2001 Symposium on Cryptography and Information Security, Oiso, Japan, Vol. 1, 23-26 January 2001; 159-164.
-
Proceedings of the 2001 Symposium on Cryptography and Information Security
, vol.1
, pp. 159-164
-
-
Go, J.1
-
23
-
-
33745079281
-
Security analysis on a conference scheme for mobile communications
-
Wan Z, Bao F, Deng RH, Ananda AL. Security analysis on a conference scheme for mobile communications. IEEE Transactions on Wireless Communications 2006; 5(6): 1238-1240.
-
(2006)
IEEE Transactions on Wireless Communications
, vol.5
, Issue.6
, pp. 1238-1240
-
-
Wan, Z.1
Bao, F.2
Deng, R.H.3
Ananda, A.L.4
-
24
-
-
0042913090
-
-
YiX,SiewK,TanCH.Asecureandefficientconferencescheme for mobile communications
-
YiX,SiewK,TanCH.Asecureandefficientconferencescheme for mobile communications. IEEE Transactions on Vehicular Technology 2003; 52(4): 784-793.
-
(2003)
IEEE Transactions on Vehicular Technology
, vol.52
, Issue.4
, pp. 784-793
-
-
-
26
-
-
15344342877
-
A novel solution for achieving anonymity in wireless ad hoc routing protocol
-
October
-
Boukerche A, Khatib El, Xu K, Lorba L. A novel solution for achieving anonymity in wireless ad hoc routing protocol. Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks table of contents, October 2004; 30-38.
-
(2004)
Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks table of contents
, pp. 30-38
-
-
Boukerche, A.1
El, K.2
Xu, K.3
Lorba, L.4
-
27
-
-
34347244961
-
An identity-free and on demand routing scheme against anonymity threats in mobile ad-hoc networks
-
Kong J, Hong X, Gerla M. An identity-free and on demand routing scheme against anonymity threats in mobile ad-hoc networks. IEEE Transaction on Mobile Computing 2007; 6(8): 888-902.
-
(2007)
IEEE Transaction on Mobile Computing
, vol.6
, Issue.8
, pp. 888-902
-
-
Kong, J.1
Hong, X.2
Gerla, M.3
-
29
-
-
84933037276
-
-
ITU-T. Rec. X.509 (revised) the Directory, International Telecommunication Union, Geneva, Switzerland, (equivalent to ISO/IEC 9594-8:1995)
-
ITU-T. Rec. X.509 (revised) the Directory--Authentication Framework, International Telecommunication Union, Geneva, Switzerland, (equivalent to ISO/IEC 9594-8:1995), 1993.
-
Authentication Framework
, pp. 1993
-
-
|