-
1
-
-
33947309703
-
Secure localization and authentication in ultra-wideband sensor networks
-
April
-
Y. Zhang, W. Liu, Y. Fang, and D. Wu, "Secure localization and authentication in ultra-wideband sensor networks," Selected Areas in Communications, IEEE Journal on, vol. 24, pp. 829-835, April 2006.
-
(2006)
Selected Areas in Communications, IEEE Journal on
, vol.24
, pp. 829-835
-
-
Zhang, Y.1
Liu, W.2
Fang, Y.3
Wu, D.4
-
2
-
-
11244273945
-
Localization for mobile sensor networks
-
ACM
-
"Localization for mobile sensor networks," in MobiCom '04: Proceedings of the 10th annual international conference on Mobile computing and networking, (New York, NY, USA), pp. 45-57, ACM, 2004.
-
(2004)
MobiCom '04: Proceedings of the 10th Annual International Conference on Mobile Computing and Networking, (New York, NY, USA)
, pp. 45-57
-
-
-
3
-
-
8344222870
-
Tps: A time-based positioning scheme for outdoor wireless sensor networks
-
vol.4, March
-
X. Cheng, A. Thaeler, G. Xue, and D. Chen, "Tps: a time-based positioning scheme for outdoor wireless sensor networks," INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies, vol. 4, pp. 2685-2696 vol.4, March 2004.
-
(2004)
INFOCOM 2004 Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies
, vol.4
, pp. 2685-2696
-
-
Cheng, X.1
Thaeler, A.2
Xue, G.3
Chen, D.4
-
4
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
February
-
D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Communications of the ACM, vol. 24, February 1981.
-
(1981)
Communications of the ACM
, vol.24
-
-
Chaum, D.1
-
5
-
-
0023861309
-
The dinning cryptographer problem: Unconditional sender and recipient untraceability
-
D. Chaum, "The dinning cryptographer problem: Unconditional sender and recipient untraceability," Journal of Cryptology, vol. 1, no. 1, pp. 65-75, 1988.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
6
-
-
14844282596
-
K-anonymous message transmission
-
L. Ahn, A. Bortz, and N. Hopper, "k-anonymous message transmission," in Proceedings of the 10th ACM conference on Computer and Communications Security, (Washington D.C., USA.), pp. 122-130, 2003.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security, (Washington D.C., USA.)
, pp. 122-130
-
-
Ahn, L.1
Bortz, A.2
Hopper, N.3
-
7
-
-
13644250069
-
Buses for anonymous message delivery
-
A. Beimel and S. Dolev, "Buses for anonymous message delivery," J. Cryptology, vol. 16, pp. 25-39, 2003.
-
(2003)
J. Cryptology
, vol.16
, pp. 25-39
-
-
Beimel, A.1
Dolev, S.2
-
8
-
-
35048865464
-
Dining cryptographers revisited
-
Advances in Cryptology - Eurocrypt 2004
-
P. Golle and A. Juels, "Dining cryptographers revisited," in Advances in Cryptology - Eurocrypt 2004, LNCS 3027, pp. 456-473, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 456-473
-
-
Golle, P.1
Juels, A.2
-
9
-
-
4944262982
-
-
Tech. Rep. 2003-1890, Cornell University, Ithaca, NY, February
-
S. Goel, M. Robson, M. Polte, and E. G. Sirer, "Herbivore: A Scalable and Efficient Protocol for Anonymous Communication," Tech. Rep. 2003-1890, Cornell University, Ithaca, NY, February 2003.
-
(2003)
Herbivore: A Scalable and Efficient Protocol for Anonymous Communication
-
-
Goel, S.1
Robson, M.2
Polte, M.3
Sirer, E.G.4
-
10
-
-
0032074579
-
Anonymous connections and onion routing
-
M. Reed, P. Syverson, and D. Goldschlag, "Anonymous connections and onion routing," IEEE J. on Selected Areas in Coomunications, Special Issue on Copyrigh and Privacy Protection, vol. 16, no. 4, pp. 482-494, 1998.
-
(1998)
IEEE J. on Selected Areas in Coomunications, Special Issue on Copyrigh and Privacy Protection
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.1
Syverson, P.2
Goldschlag, D.3
-
11
-
-
0002054934
-
Crowds: Anonymity for web transaction
-
M. K. Reiter and A. D. Rubin, "Crowds: anonymity for web transaction," ACM Transactions on Information and System Security, vol. 1, no. 1, pp. 66-92, 1998.
-
(1998)
ACM Transactions on Information and System Security
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.K.1
Rubin, A.D.2
-
12
-
-
4544298056
-
Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks
-
IEEE Computer Society
-
J. Deng, R. Han, and S. Mishra, "Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks," in DSN '04: Proceedings of the 2004 International Conference on Dependable Systems and Networks, (Washington, DC, USA), p. 637, IEEE Computer Society, 2004.
-
(2004)
DSN '04: Proceedings of the 2004 International Conference on Dependable Systems and Networks, (Washington, DC, USA)
, pp. 637
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
13
-
-
33847297141
-
Countermeasures against traffic analysis attacks in wireless sensor networks
-
Sept.
-
J. Deng, R. Han, and S. Mishra, "Countermeasures against traffic analysis attacks in wireless sensor networks," Security and Privacy for Emerging Areas in Communications Networks, 2005. SecureComm 2005. First International Conference on, pp. 113-126, Sept. 2005.
-
(2005)
Security and Privacy for Emerging Areas in Communications Networks, 2005 SecureComm 2005. First International Conference on
, pp. 113-126
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
14
-
-
56749163645
-
Towards event source unobservability with minimum network traffic in sensor networks
-
ACM
-
Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao, "Towards event source unobservability with minimum network traffic in sensor networks," in WiSec '08: Proceedings of the first ACM conference on Wireless network security, (New York, NY, USA), pp. 77-88, ACM, 2008.
-
(2008)
WiSec '08: Proceedings of the First ACM Conference on Wireless Network Security, (New York, NY, USA)
, pp. 77-88
-
-
Yang, Y.1
Shao, M.2
Zhu, S.3
Urgaonkar, B.4
Cao, G.5
-
15
-
-
51349086896
-
Towards statistically strong source anonymity for sensor networks
-
April
-
M. Shao, Y. Yang, S. Zhu, and G. Cao, "Towards statistically strong source anonymity for sensor networks," INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, pp. 51-55, April 2008.
-
(2008)
INFOCOM 2008. the 27th Conference on Computer Communications. IEEE
, pp. 51-55
-
-
Shao, M.1
Yang, Y.2
Zhu, S.3
Cao, G.4
-
16
-
-
27944449345
-
Enhancing sourcelocation privacy in sensor network routing
-
June
-
P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, "Enhancing sourcelocation privacy in sensor network routing," Distributed Computing Systems, 2005. ICDCS 2005. Proceedings. 25th IEEE International Conference on, pp. 599-608, June 2005.
-
(2005)
Distributed Computing Systems, 2005. ICDCS 2005. Proceedings. 25th IEEE International Conference on
, pp. 599-608
-
-
Kamat, P.1
Zhang, Y.2
Trappe, W.3
Ozturk, C.4
-
17
-
-
14844303406
-
Source-location privacy in energy-constrained sensor network routing
-
New York, NY, USA, ACM
-
C. Ozturk, Y. Zhang, and W. Trappe, "Source-location privacy in energy-constrained sensor network routing," in SASN '04, (New York, NY, USA), pp. 88-93, ACM, 2004.
-
(2004)
SASN '04
, pp. 88-93
-
-
Ozturk, C.1
Zhang, Y.2
Trappe, W.3
-
18
-
-
33847141964
-
Preserving source location privacy in monitoring-based wireless sensor networks
-
IEEE
-
Y. Xi, L. Schwiebert, and W. Shi, "Preserving source location privacy in monitoring-based wireless sensor networks.," in IPDPS, IEEE, 2006.
-
(2006)
IPDPS
-
-
Xi, Y.1
Schwiebert, L.2
Shi, W.3
-
19
-
-
55149095912
-
A novel scheme for protecting receiver's location privacy in wireless sensor networks
-
October
-
Y. Jian, S. Chen, Z. Zhang, and L. Zhang, "A novel scheme for protecting receiver's location privacy in wireless sensor networks," Wireless Communications, IEEE Transactions on, vol. 7, pp. 3769-3779, October 2008.
-
(2008)
Wireless Communications, IEEE Transactions on
, vol.7
, pp. 3769-3779
-
-
Jian, Y.1
Chen, S.2
Zhang, Z.3
Zhang, L.4
-
20
-
-
45249111845
-
-
Wikipedia, "Normal distribution." http://en.wikipedia.org/wiki/ Normal-distribution.
-
Normal Distribution
-
-
-
21
-
-
0003864365
-
-
Harvard University Press. chapter 22 History of the term "normal distribution".
-
S. M. Stigler, Statistics on the Table. Harvard University Press. chapter 22 (History of the term "normal distribution".
-
Statistics on the Table
-
-
Stigler, S.M.1
|