-
1
-
-
74049157936
-
-
http://www.aka-aki.com/.
-
-
-
-
2
-
-
74049148635
-
-
http://www.csg.ethz.ch/research/projects/Blue-star.
-
-
-
-
3
-
-
74049149570
-
-
http://reality.media.mit.edu/serendipity.php.
-
-
-
-
4
-
-
74049104293
-
-
IEEE P1609.2 Version 1. Standard for wireless access in vehicular environments, security services for applications and management messages. In development, 2006
-
IEEE P1609.2 Version 1. Standard for wireless access in vehicular environments - security services for applications and management messages. In development, 2006.
-
-
-
-
7
-
-
2942587015
-
Mix zones: User privacy in location-aware services
-
A. R. Beresford and F. Stajano. Mix zones: User privacy in location-aware services. In PerSec, 2004.
-
(2004)
PerSec
-
-
Beresford, A.R.1
Stajano, F.2
-
8
-
-
60149092949
-
Wireless device identification with radiometric signatures
-
V. Brik, S. Banerjee, M. Gruteser, and S. Oh. Wireless device identification with radiometric signatures. In MobiCom, 2008.
-
(2008)
MobiCom
-
-
Brik, V.1
Banerjee, S.2
Gruteser, M.3
Oh, S.4
-
9
-
-
58149134080
-
On the effectiveness of changing pseudonyms to provide location privacy in VANETs
-
L. Buttyan, T. Holczer, and I. Vajda. On the effectiveness of changing pseudonyms to provide location privacy in VANETs. In ESAS, 2007.
-
(2007)
ESAS
-
-
Buttyan, L.1
Holczer, T.2
Vajda, I.3
-
12
-
-
0038687775
-
-
J. Camenisch and E. Van Herreweghen. Design and implementation of the Idemix anonymous credential system. In CCS, 2002.
-
J. Camenisch and E. Van Herreweghen. Design and implementation of the Idemix anonymous credential system. In CCS, 2002.
-
-
-
-
13
-
-
34547379480
-
-
J. Camenisch, S. Hohenberger, M. Kohlweiss, A. Lysyanskaya, and M. Meyerovich. How to win the clone wars: efficient periodic n-times anonymous authentication. In CCS, 2006.
-
J. Camenisch, S. Hohenberger, M. Kohlweiss, A. Lysyanskaya, and M. Meyerovich. How to win the clone wars: efficient periodic n-times anonymous authentication. In CCS, 2006.
-
-
-
-
14
-
-
38049146172
-
Batch verification of short signatures
-
J. Camenish, S. Hohenberger, and M. O. Pedersen. Batch verification of short signatures. In EUROCRYPT, volume 4515, pages 246-263, 2007.
-
(2007)
EUROCRYPT
, vol.4515
, pp. 246-263
-
-
Camenish, J.1
Hohenberger, S.2
Pedersen, M.O.3
-
15
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2), 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
-
-
Chaum, D.1
-
19
-
-
71049178173
-
Transient-based identification of wireless sensor nodes
-
B. Danev and S. Capkun. Transient-based identification of wireless sensor nodes. In IPSN, 2009.
-
(2009)
IPSN
-
-
Danev, B.1
Capkun, S.2
-
20
-
-
13944266651
-
A delay-tolerant network architecture for challenged internets
-
K. Fall. A delay-tolerant network architecture for challenged internets. In SIGCOMM, 2003.
-
(2003)
SIGCOMM
-
-
Fall, K.1
-
21
-
-
85018108881
-
Passive data link layer 802.11 wireless device driver ngerprinting
-
J. Franklin, D. McCoy, P. Tabriz, V. Neagoe, J. Randwyk, and D. Sicker. Passive data link layer 802.11 wireless device driver ngerprinting. In USENIX, 2006.
-
(2006)
USENIX
-
-
Franklin, J.1
McCoy, D.2
Tabriz, P.3
Neagoe, V.4
Randwyk, J.5
Sicker, D.6
-
22
-
-
58149131713
-
Mix zones for location privacy in vehicular networks
-
J. Freudiger, M. Raya, M. Felegyhazi, P. Papadimitratos, and J.-P. Hubaux. Mix zones for location privacy in vehicular networks. In WiN-ITS, 2007.
-
(2007)
WiN-ITS
-
-
Freudiger, J.1
Raya, M.2
Felegyhazi, M.3
Papadimitratos, P.4
Hubaux, J.-P.5
-
23
-
-
74049139346
-
Self-organized anonymous authentication in mobile networks
-
J. Freudiger, M. Raya, and J.-P. Hubaux. Self-organized anonymous authentication in mobile networks. In SECURECOMM, 2009.
-
(2009)
SECURECOMM
-
-
Freudiger, J.1
Raya, M.2
Hubaux, J.-P.3
-
26
-
-
67650661159
-
Improving wireless privacy with an identifier-free link layer protocol
-
B. Greenstein, D. McCoy, J. Pang, T. Kohno, S. Seshan, and D. Wetherall. Improving wireless privacy with an identifier-free link layer protocol. In MobiSys, 2008.
-
(2008)
MobiSys
-
-
Greenstein, B.1
McCoy, D.2
Pang, J.3
Kohno, T.4
Seshan, S.5
Wetherall, D.6
-
27
-
-
23944520444
-
Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis
-
M. Gruteser and D. Grunwald. Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis. Mob. Netw. Appl., 2005.
-
(2005)
Mob. Netw. Appl
-
-
Gruteser, M.1
Grunwald, D.2
-
28
-
-
11144331561
-
Enhancing intrusion detection in wireless networks using radio frequency fingerprinting
-
J. Hall, M. Barbeau, and E. Kranakis. Enhancing intrusion detection in wireless networks using radio frequency fingerprinting. In CIIT, 2004.
-
(2004)
CIIT
-
-
Hall, J.1
Barbeau, M.2
Kranakis, E.3
-
29
-
-
4544259607
-
Rational secret sharing and multiparty computation: Extended abstract
-
J. Halpern and V. Teague. Rational secret sharing and multiparty computation: extended abstract. In STOC, pages 623-632, 2004.
-
(2004)
STOC
, pp. 623-632
-
-
Halpern, J.1
Teague, V.2
-
30
-
-
0000725056
-
Games with incomplete information played by Bayesian players
-
J. Harsanyi. Games with incomplete information played by Bayesian players. Management Science, 1967.
-
(1967)
Management Science
-
-
Harsanyi, J.1
-
32
-
-
33847315663
-
Protecting location privacy through path confusion
-
B. Hoh and M. Gruteser. Protecting location privacy through path confusion. In SECURECOMM, pages 194-205, 2005.
-
(2005)
SECURECOMM
, pp. 194-205
-
-
Hoh, B.1
Gruteser, M.2
-
33
-
-
85127507791
-
Virtual trip lines for distributed privacy-preserving traffic monitoring
-
B. Hoh, M. Gruteser, R. Herring, J. Ban, D. Work, J.-C. Herrera, A. M. Bayen, M. Annavaram, and Q. Jacobson. Virtual trip lines for distributed privacy-preserving traffic monitoring. In MobiSys, pages 15-28, 2008.
-
(2008)
MobiSys
, pp. 15-28
-
-
Hoh, B.1
Gruteser, M.2
Herring, R.3
Ban, J.4
Work, D.5
Herrera, J.-C.6
Bayen, A.M.7
Annavaram, M.8
Jacobson, Q.9
-
34
-
-
33750879264
-
Enhancing security and privacy in traffic-monitoring systems
-
B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady. Enhancing security and privacy in traffic-monitoring systems. IEEE Pervasive Computing, 5(4):38-46, 2006.
-
(2006)
IEEE Pervasive Computing
, vol.5
, Issue.4
, pp. 38-46
-
-
Hoh, B.1
Gruteser, M.2
Xiong, H.3
Alrabady, A.4
-
35
-
-
74049122962
-
-
B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady. Preserving privacy in GPS traces via path cloaking. In CCS, 2007.
-
B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady. Preserving privacy in GPS traces via path cloaking. In CCS, 2007.
-
-
-
-
36
-
-
24944489750
-
Enhancing wireless location privacy using silent period
-
L. Huang, K. Matsuura, H. Yamane, and K. Sezaki. Enhancing wireless location privacy using silent period. In ECNC, 2005.
-
(2005)
ECNC
-
-
Huang, L.1
Matsuura, K.2
Yamane, H.3
Sezaki, K.4
-
37
-
-
74049089535
-
-
L. Huang, K. Matsuura, H. Yamane, and K. Sezako. Towards modeling wireless location privacy. In PET, 2005.
-
L. Huang, K. Matsuura, H. Yamane, and K. Sezako. Towards modeling wireless location privacy. In PET, 2005.
-
-
-
-
38
-
-
33748582624
-
Rational secure computation and ideal mechanism design
-
S. Izmalkov, S. Micali, and M. Lepinski. Rational secure computation and ideal mechanism design. In FOCS, pages 585-595, 2005.
-
(2005)
FOCS
, pp. 585-595
-
-
Izmalkov, S.1
Micali, S.2
Lepinski, M.3
-
39
-
-
74049117319
-
-
J. Katz. Bridging game theory and cryptography: Recent results and future directions. In TCC, 2008.
-
J. Katz. Bridging game theory and cryptography: Recent results and future directions. In TCC, 2008.
-
-
-
-
40
-
-
24344507334
-
Remote physical device fingerprinting
-
T. Kohno, A. Broido, and K.C. Claffy. Remote physical device fingerprinting. TDSC, 2, 2005.
-
(2005)
TDSC
, vol.2
-
-
Kohno, T.1
Broido, A.2
Claffy, K.C.3
-
42
-
-
51249095993
-
Inference attacks on location tracks
-
J. Krumm. Inference attacks on location tracks. In Pervasive, 2007.
-
(2007)
Pervasive
-
-
Krumm, J.1
-
43
-
-
34247381045
-
Swing & swap: User centric approaches towards maximizing location privacy
-
M. Li, K. Sampigethaya, L. Huang, and R. Poovendran. Swing & swap: User centric approaches towards maximizing location privacy. In WPES, 2006.
-
(2006)
WPES
-
-
Li, M.1
Sampigethaya, K.2
Huang, L.3
Poovendran, R.4
-
46
-
-
51349157157
-
Implications of radio fingerprinting on the security of sensor networks
-
B. Rasmussen and S. Capkun. Implications of radio fingerprinting on the security of sensor networks. In SECURECOMM, 2007.
-
(2007)
SECURECOMM
-
-
Rasmussen, B.1
Capkun, S.2
-
47
-
-
70349267771
-
-
M. Raya, M. H. Manshaei, M. Felegyhazi, and J.-P. Hubaux. Revocation Games in Ephemeral Networks. In CCS, 2008.
-
M. Raya, M. H. Manshaei, M. Felegyhazi, and J.-P. Hubaux. Revocation Games in Ephemeral Networks. In CCS, 2008.
-
-
-
-
48
-
-
33644812740
-
Computing best-response strategies in infinite games of incomplete information
-
D. M. Reeves and M.P. Wellman. Computing best-response strategies in infinite games of incomplete information. In Uncertainty in artificial intelligence, pages 470-478, 2004.
-
(2004)
Uncertainty in artificial intelligence
, pp. 470-478
-
-
Reeves, D.M.1
Wellman, M.P.2
-
50
-
-
57049149967
-
CARAVAN: Providing location privacy for VANET
-
K. Sampigethaya, M. Li L. Huang, R. Poovendran, K. Matsuura, and K. Sezaki. CARAVAN: Providing location privacy for VANET. In ESCAR, 2005.
-
(2005)
ESCAR
-
-
Sampigethaya, K.1
Li, M.2
Huang, L.3
Poovendran, R.4
Matsuura, K.5
Sezaki, K.6
-
51
-
-
74049106754
-
Impact of pseudonym changes on geographic routing in VANETs
-
E. Schoch, F. Kargl, T. Leinmuller, S. Schlott, and P. Papadimitratos. Impact of pseudonym changes on geographic routing in VANETs. In ESAS, 2006.
-
(2006)
ESAS
-
-
Schoch, E.1
Kargl, F.2
Leinmuller, T.3
Schlott, S.4
Papadimitratos, P.5
-
52
-
-
74049153572
-
-
A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In PET, 2002.
-
A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In PET, 2002.
-
-
-
-
54
-
-
74049103464
-
Economic aspects of personal privacy
-
UC Berkeley
-
H. Varian. Economic aspects of personal privacy. White paper, UC Berkeley, 1996.
-
(1996)
White paper
-
-
Varian, H.1
-
55
-
-
25644446164
-
On neighbor discovery in wireless networks with directional antennas
-
S. Vasudevan, J. Kurose, and D. Towsley. On neighbor discovery in wireless networks with directional antennas. In Infocom, 2005.
-
(2005)
Infocom
-
-
Vasudevan, S.1
Kurose, J.2
Towsley, D.3
-
56
-
-
14944368943
-
Vehicle-to-vehicle safety messaging in DSRC
-
Q. Xu, T. Mak, J. Ko, and R. Sengupta. Vehicle-to-vehicle safety messaging in DSRC. In VANET, 2004.
-
(2004)
VANET
-
-
Xu, Q.1
Mak, T.2
Ko, J.3
Sengupta, R.4
|