-
1
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
February
-
D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Communications of the ACM, vol.24, February 1981.
-
(1981)
Communications of the ACM
, vol.24
-
-
Chaum, D.1
-
2
-
-
0023861309
-
The dinning cryptographer problem: Unconditional sender and recipient untraceability
-
D. Chaum, "The dinning cryptographer problem: Unconditional sender and recipient untraceability," Journal of Cryptology, vol.1, no.1, pp. 65-75, 1988.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
3
-
-
14844282596
-
K-anonymous message transmission
-
Washington D.C., USA.
-
L. Ahn, A. Bortz, and N. Hopper, "k-anonymous message transmission," in Proceedings of the 10th ACM conference on Computer and Communications Security, (Washington D.C., USA.), pp. 122-130, 2003.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 122-130
-
-
Ahn, L.1
Bortz, A.2
Hopper, N.3
-
4
-
-
13644250069
-
Buses for anonymous message delivery
-
A. Beimel and S. Dolev, "Buses for anonymous message delivery," J. Cryptology, vol.16, pp. 25-39, 2003.
-
(2003)
J. Cryptology
, vol.16
, pp. 25-39
-
-
Beimel, A.1
Dolev, S.2
-
5
-
-
84937578170
-
Web mixes: A system for anonymous and unobservable Internet access
-
O. Berthold, H. Federrath, and S. Köpsell, "Web mixes: A system for anonymous and unobservable Internet access," Lecture Notes in Computer Science, pp. 115-129, 2001.
-
(2001)
Lecture Notes in Computer Science
, pp. 115-129
-
-
Berthold, O.1
Federrath, H.2
Köpsell, S.3
-
7
-
-
35248844472
-
Provably secure public-key encryption for length-preserving chaumian mixes
-
LNCS 2612, April
-
B. Möller, "Provably secure public-key encryption for length-preserving chaumian mixes," in Proceedings of CT-RSA 2003, LNCS 2612, pp. 244-262, April 2003.
-
(2003)
Proceedings of CT-RSA 2003
, pp. 244-262
-
-
Möller, B.1
-
11
-
-
0032074579
-
Anonymous connections and onion routing
-
M. Reed, P. Syverson, and D. Goldschlag, "Anonymous connections and onion routing," IEEE J. on Selected Areas in Coomunications, Special Issue on Copyrigh and Privacy Protection, vol.16, no.4, pp. 482-494, 1998.
-
(1998)
IEEE J. on Selected Areas in Coomunications, Special Issue on Copyrigh and Privacy Protection
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.1
Syverson, P.2
Goldschlag, D.3
-
12
-
-
0002054934
-
Crowds: Anonymity for web transaction
-
M. K. Reiter and A. D. Rubin, "Crowds: anonymity for web transaction," ACM Transactions on Information and System Security, vol.1, no.1, pp. 66-92, 1998.
-
(1998)
ACM Transactions on Information and System Security
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.K.1
Rubin, A.D.2
-
13
-
-
4944262982
-
-
Tech. Rep. 2003-11890, Cornell University, Ithaca, NY, February
-
S. Goel, M. Robson, M. Polte, and E. G. Sirer, "Herbivore: A Scalable and Efficient Protocol for Anonymous Communication," Tech. Rep. 2003-11890, Cornell University, Ithaca, NY, February 2003.
-
(2003)
Herbivore: A Scalable and Efficient Protocol for Anonymous Communication
-
-
Goel, S.1
Robson, M.2
Polte, M.3
Sirer, E.G.4
-
14
-
-
4544298056
-
Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks
-
(Washington, DC, USA), IEEE Computer Society
-
J. Deng, R. Han, and S. Mishra, "Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks," in DSN '04: Proceedings of the 2004 International Conference on Dependable Systems and Networks, (Washington, DC, USA), p. 637, IEEE Computer Society, 2004.
-
(2004)
DSN '04: Proceedings of the 2004 International Conference on Dependable Systems and Networks
, pp. 637
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
15
-
-
51349086896
-
Towards statistically strong source anonymity for sensor networks
-
IEEE, April
-
M. Shao, Y. Yang, S. Zhu, and G. Cao, "Towards statistically strong source anonymity for sensor networks," INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, pp. 51-55, April 2008.
-
(2008)
INFOCOM 2008. the 27th Conference on Computer Communications
, pp. 51-55
-
-
Shao, M.1
Yang, Y.2
Zhu, S.3
Cao, G.4
-
16
-
-
27944449345
-
Enhancing sourcelocation privacy in sensor network routing
-
June 2005
-
P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, "Enhancing sourcelocation privacy in sensor network routing," Distributed Computing Systems, 2005. ICDCS 2005. Proceedings. 25th IEEE International Conference on, pp. 599-608, June 2005.
-
ICDCS 2005. Proceedings. 25th IEEE International Conference on Distributed Computing Systems 2005
, pp. 599-608
-
-
Kamat, P.1
Zhang, Y.2
Trappe, W.3
Ozturk, C.4
-
17
-
-
14844303406
-
Source-location privacy in nergyconstrained sensor network routing
-
(New York, NY, USA), ACM
-
C. Ozturk, Y. Zhang, and W. Trappe, "Source-location privacy in nergyconstrained sensor network routing," in SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, (New York, NY, USA), pp. 88-93, ACM, 2004.
-
(2004)
SASN '04: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 88-93
-
-
Ozturk, C.1
Zhang, Y.2
Trappe, W.3
-
18
-
-
33847141964
-
Preserving source location privacy in monitoring-based wireless sensor networks
-
IEEE
-
Y. Xi, L. Schwiebert, and W. Shi, "Preserving source location privacy in monitoring-based wireless sensor networks.," in IPDPS, IEEE, 2006.
-
(2006)
IPDPS
-
-
Xi, Y.1
Schwiebert, L.2
Shi, W.3
-
19
-
-
70449569774
-
-
http://www.panda.org/.
-
-
-
-
20
-
-
33947309703
-
Secure localization and authentication in ultra-wideband sensor networks
-
DOI 10.1109/JSAC.2005.863855
-
Y. Zhang, W. Liu, Y. Fang, and D. Wu, "Secure localization and authentication in ultra-wideband sensor networks," Selected Areas in Communications, IEEE Journal on, vol.24, pp. 829-835, April 2006. (Pubitemid 46438080)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, pp. 829-835
-
-
Zhang, Y.1
Liu, W.2
Fang, Y.3
Wu, D.4
-
21
-
-
11244273945
-
Localization for mobile sensor networks
-
(New York, NY, USA), ACM
-
"Localization for mobile sensor networks," in MobiCom '04: Proceedings of the 10th annual international conference on Mobile computing and networking, (New York, NY, USA), pp. 45-57, ACM, 2004.
-
(2004)
MobiCom '04: Proceedings of the 10th Annual International Conference on Mobile Computing and Networking
, pp. 45-57
-
-
-
22
-
-
8344222870
-
Tps: A time-based positioning scheme for outdoor wireless sensor networks
-
vol 4, March
-
X. Cheng, A. Thaeler, G. Xue, and D. Chen, "Tps: a time-based positioning scheme for outdoor wireless sensor networks," INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies, vol.4, pp. 2685-2696 vol.4, March 2004.
-
(2004)
INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies
, vol.4
, pp. 2685-2696
-
-
Cheng, X.1
Thaeler, A.2
Xue, G.3
Chen, D.4
-
23
-
-
25844435733
-
Pike: Peer intermediaries for key establishment in sensor networks
-
vol 1, March
-
H. Chan and A. Perrig, "Pike: peer intermediaries for key establishment in sensor networks," INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE, vol.1, pp. 524-535 vol. 1, March 2005.
-
(2005)
INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE
, vol.1
, pp. 524-535
-
-
Chan, H.1
Perrig, A.2
-
24
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
(Rome, Italy), July
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar, "SPINS: Security protocols for sensor networks," in Seventh Annual International Conference on Mobile Computing and Networks (MobiCOM 2001), (Rome, Italy), July 2001.
-
(2001)
Seventh Annual International Conference on Mobile Computing and Networks (MobiCOM 2001)
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
25
-
-
34247606829
-
Efficient hybrid security mechanisms for heterogeneous sensor networks
-
June
-
P. Traynor, R. Kumar, H. Choi, G. Cao, S. Zhu, and T. La Porta, "Efficient hybrid security mechanisms for heterogeneous sensor networks," Mobile Computing, IEEE Transactions on, vol.6, pp. 663-677, June 2007.
-
(2007)
IEEE Transactions on Mobile Computing
, vol.6
, pp. 663-677
-
-
Traynor, P.1
Kumar, R.2
Choi, H.3
Cao, G.4
Zhu, S.5
La Porta, T.6
-
26
-
-
10044284351
-
Leap: Efficient security mechanisms for large-scale distributed sensor networks
-
(New York, NY, USA), ACM
-
S. Zhu, S. Setia, and S. Jajodia, "Leap: efficient security mechanisms for large-scale distributed sensor networks," in CCS '03: Proceedings of the 10th ACM conference on Computer and communications security, (New York, NY, USA), pp. 62-72, ACM, 2003.
-
(2003)
CCS '03: Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
27
-
-
0034445661
-
System architecture directions for networked sensors
-
November
-
J. Hill, R. Szewczyk, S. H. A. Woo, D. Culler, and K. Pister, "System architecture directions for networked sensors," in Proceedings of ACM ASPLOS IX, November 2000.
-
(2000)
Proceedings of ACM ASPLOS IX
-
-
Hill, J.1
Szewczyk, R.2
Woo, S.H.A.3
Culler, D.4
Pister, K.5
-
28
-
-
28444435923
-
Eecs: An energy efficient clustering scheme in wireless sensor networks
-
April
-
M. Ye, C. Li, G. Chen, and J. Wu, "Eecs: an energy efficient clustering scheme in wireless sensor networks," Performance, Computing, and Communications Conference, 2005. IPCCC 2005. 24th IEEE International, pp. 535-540, April 2005.
-
(2005)
Performance, Computing, and Communications Conference 2005. IPCCC 2005. 24th IEEE International
, pp. 535-540
-
-
Ye, M.1
Li, C.2
Chen, G.3
Wu, J.4
-
30
-
-
33750394324
-
Asymmetric multihop communication in large sensor networks
-
Jan.
-
J. Neander, E. Hansen, M. Nolin, and M. Bjorkman, "Asymmetric multihop communication in large sensor networks," Wireless Pervasive Computing, 2006 1st International Symposium on, pp. 7 pp.-, Jan. 2006.
-
2006 1st International Symposium on Wireless Pervasive Computing
, vol.2006
, pp. 7
-
-
Neander, J.1
Hansen, E.2
Nolin, M.3
Bjorkman, M.4
-
31
-
-
10944266504
-
Heed: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks
-
Oct.-Dec.
-
O. Younis and S. Fahmy, "Heed: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks," Mobile Computing, IEEE Transactions on, vol.3, pp. 366-379, Oct.-Dec. 2004.
-
(2004)
IEEE Transactions on Mobile Computing
, vol.3
, pp. 366-379
-
-
Younis, O.1
Fahmy, S.2
-
32
-
-
45249111845
-
-
Wikipedia. "http://en.wikipedia.org/wiki/Normal-distribution"
-
Wikipedia, "Normal distribution." http://en.wikipedia.org/wiki/ Normal-distribution.
-
Normal Distribution
-
-
-
33
-
-
0003864365
-
-
Harvard University Press. Chapter 22 (History of the term "normal distribution".
-
S. M. Stigler, Statistics on the Table. Harvard University Press. Chapter 22 (History of the term "normal distribution".
-
Statistics on the Table
-
-
Stigler, S.M.1
|