-
1
-
-
55649095270
-
Location privacy and anonymity preserving routing for wireless sensor networks
-
A. A. Nezhad, A. Miri, and D. Makrakis, "Location privacy and anonymity preserving routing for wireless sensor networks," Comput. Netw., vol. 52, no. 18, pp. 3433-3452, 2008.
-
(2008)
Comput. Netw
, vol.52
, Issue.18
, pp. 3433-3452
-
-
Nezhad, A.A.1
Miri, A.2
Makrakis, D.3
-
2
-
-
32644437991
-
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
-
J. Deng, R. Han, and S. Mishra, "Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks," Elsevier Journal of Pervasive and Mobile Computing on Security in Wireless Mobile Computing Systems, vol. 2, no. 2, pp. 159-186, 2006.
-
(2006)
Elsevier Journal of Pervasive and Mobile Computing on Security in Wireless Mobile Computing Systems
, vol.2
, Issue.2
, pp. 159-186
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
3
-
-
48349110568
-
Location privacy in sensor networks against a global eavesdropper
-
K. Mehta, D. Liu, and M. Wright, "Location privacy in sensor networks against a global eavesdropper," in Proc. of IEEE ICNP, 2007.
-
(2007)
Proc. of IEEE ICNP
-
-
Mehta, K.1
Liu, D.2
Wright, M.3
-
4
-
-
56749163645
-
Towards event source unobservability with minimum network traffic in sensor networks
-
Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao, "Towards event source unobservability with minimum network traffic in sensor networks," in Proc. of ACM WiSec, 2008.
-
(2008)
Proc. of ACM WiSec
-
-
Yang, Y.1
Shao, M.2
Zhu, S.3
Urgaonkar, B.4
Cao, G.5
-
5
-
-
55149095912
-
A novel scheme for protecting receiver's location privacy in wireless sensor networks
-
October
-
Y. Jian, S. Chen, Z. Zhang, and L. Zhang, "A novel scheme for protecting receiver's location privacy in wireless sensor networks," IEEE Trans. on Wireless Comm., vol. 7, no. 10, pp. 3769-3779, October 2008.
-
(2008)
IEEE Trans. on Wireless Comm
, vol.7
, Issue.10
, pp. 3769-3779
-
-
Jian, Y.1
Chen, S.2
Zhang, Z.3
Zhang, L.4
-
6
-
-
70449501336
-
Preserving source location privacy in monitoring based wireless sensor networks
-
Y. Xi, L. Schwiebert, and W. Shi, "Preserving source location privacy in monitoring based wireless sensor networks," in Proc. of SSN, 2006.
-
(2006)
Proc. of SSN
-
-
Xi, Y.1
Schwiebert, L.2
Shi, W.3
-
7
-
-
27944449345
-
Enhancing sourcelocation privacy in sensor network routing
-
P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, "Enhancing sourcelocation privacy in sensor network routing," in Proc. IEEE ICDCS, 2005.
-
(2005)
Proc. IEEE ICDCS
-
-
Kamat, P.1
Zhang, Y.2
Trappe, W.3
Ozturk, C.4
-
8
-
-
51349086896
-
Towards statistically strong source anonymity for sensor networks
-
M. Shao, Y. Yang, S. Zhu, and G. Cao, "Towards statistically strong source anonymity for sensor networks," in Proc. of IEEE INFOCOM, 2008.
-
(2008)
Proc. of IEEE INFOCOM
-
-
Shao, M.1
Yang, Y.2
Zhu, S.3
Cao, G.4
-
9
-
-
4544367290
-
Source-location privacy for networks of energy-constrained sensors
-
C. Ozturk, Y. Zhang, W. Trappe, and M. Ott, "Source-location privacy for networks of energy-constrained sensors," in Proc. of IEEE SEUS, 2004.
-
(2004)
Proc. of IEEE SEUS
-
-
Ozturk, C.1
Zhang, Y.2
Trappe, W.3
Ott, M.4
-
10
-
-
33847315663
-
Protecting location privacy through path confusion
-
B. Hoh and M. Gruteser, "Protecting location privacy through path confusion," in Proc. of SECURECOMM, 2005.
-
(2005)
Proc. of SECURECOMM
-
-
Hoh, B.1
Gruteser, M.2
-
11
-
-
23944520444
-
Enhancing location privacy in wireless Ian through disposable interface identifiers: A quantitative analysis
-
M. Gruteser and D. Grunwald, "Enhancing location privacy in wireless Ian through disposable interface identifiers: a quantitative analysis," Mob. Netw. Appl., vol. 10, no. 3, pp. 315-325, 2005.
-
(2005)
Mob. Netw. Appl
, vol.10
, Issue.3
, pp. 315-325
-
-
Gruteser, M.1
Grunwald, D.2
-
12
-
-
28444433009
-
Random key predistribution schemes for sensor networks
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proc. of IEEE SSP, 2003.
-
(2003)
Proc. of IEEE SSP
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
13
-
-
32844459414
-
A key predistribution scheme for sensor networks using deployment knowledge
-
W. Du, J. Deng, Y. S. Han, and P. K. Varshney, "A key predistribution scheme for sensor networks using deployment knowledge," IEEE Trans. on Dependable and Secure Comp., vol. 3, no. 1, pp. 62-77, 2006.
-
(2006)
IEEE Trans. on Dependable and Secure Comp
, vol.3
, Issue.1
, pp. 62-77
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
14
-
-
25844443821
-
Anonymous communications in mobile ad hoc networks
-
Y. Zhang, W. Liu, and W. Lou, "Anonymous communications in mobile ad hoc networks," in Proc. of IEEE INFOCOM, 2005.
-
(2005)
Proc. of IEEE INFOCOM
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
-
15
-
-
34347244961
-
An identity-free and on-demand routing scheme against anonymity threats in mobile ad hoc networks
-
J. Kong, X. Hong, and M. Gerla, "An identity-free and on-demand routing scheme against anonymity threats in mobile ad hoc networks," IEEE Trans. on Mob. Comp., vol. 6, no. 8, pp. 888-902, 2007.
-
(2007)
IEEE Trans. on Mob. Comp
, vol.6
, Issue.8
, pp. 888-902
-
-
Kong, J.1
Hong, X.2
Gerla, M.3
-
17
-
-
34248678132
-
A secure anonymous routing protocol with authenticated key exchange for ad hoc networks
-
R. Lu, Z. Cao, L. Wang, and C. Sun, "A secure anonymous routing protocol with authenticated key exchange for ad hoc networks," Comput. Stand. Interfaces, vol. 29, no. 5, pp. 521-527, 2007.
-
(2007)
Comput. Stand. Interfaces
, vol.29
, Issue.5
, pp. 521-527
-
-
Lu, R.1
Cao, Z.2
Wang, L.3
Sun, C.4
-
18
-
-
20544471574
-
Sdar: A secure distributed anonymous routing protocol for wireless and mobile ad hoc networks
-
A. Boukerche, K. EI-Khatib, L. Xu, and L. Korba, "Sdar: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks," in Proc. of IEEE LCN, 2004.
-
(2004)
Proc. of IEEE LCN
-
-
Boukerche, A.1
EI-Khatib, K.2
Xu, L.3
Korba, L.4
-
19
-
-
70449477282
-
Traffic analysis based unlinkability measure for ieee 802.11b-based communication systems
-
D. Huang, "Traffic analysis based unlinkability measure for ieee 802.11b-based communication systems," in Proc. ofACM WiSe, 2006.
-
(2006)
Proc. ofACM WiSe
-
-
Huang, D.1
|