메뉴 건너뛰기




Volumn , Issue , 2010, Pages

On the age of pseudonyms in mobile ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

ANALYTICAL EVALUATION; PEER TO PEER; PRIVACY SYSTEMS; SHORT DISTANCES; SPECIFIC LOCATION;

EID: 77953316394     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2010.5461975     Document Type: Conference Paper
Times cited : (54)

References (26)
  • 1
    • 53649095038 scopus 로고    scopus 로고
    • A class of mean field interaction models for computer and communication systems
    • M. Benaïm and J.-Y. Le Boudec. A class of mean field interaction models for computer and communication systems. Performance Evaluation, 65(11-12):823-838, 2008.
    • (2008) Performance Evaluation , vol.65 , Issue.11-12 , pp. 823-838
    • Benaïm, M.1    Le Boudec, J.-Y.2
  • 3
  • 5
    • 60149092949 scopus 로고    scopus 로고
    • Wireless device identification with radiometric signatures
    • V. Brik, S. Banerjee, M. Gruteser, and S. Oh. Wireless device identification with radiometric signatures. In MobiCom, 2008.
    • (2008) MobiCom
    • Brik, V.1    Banerjee, S.2    Gruteser, M.3    Oh, S.4
  • 6
    • 58149134080 scopus 로고    scopus 로고
    • On the effectiveness of changing pseudonyms to provide location privacy in VANETs
    • L. Buttyan, T. Holczer, and I. Vajda. On the effectiveness of changing pseudonyms to provide location privacy in VANETs. In ESAS, 2007.
    • (2007) ESAS
    • Buttyan, L.1    Holczer, T.2    Vajda, I.3
  • 7
    • 0038675868 scopus 로고    scopus 로고
    • A survey of mobility models for ad hoc network research
    • DOI 10.1002/wcm.72
    • T. Camp, J. Boleng, and V. Davies. A survey of mobility models for ad hoc network research. Wireless Communication & Mobile Computing (WCMC), 2(5):483-502, 2002. (Pubitemid 135713186)
    • (2002) Wireless Communications and Mobile Computing , vol.2 , Issue.5 , pp. 483-502
    • Camp, T.1    Boleng, J.2    Davies, V.3
  • 9
    • 71049178173 scopus 로고    scopus 로고
    • Transient-based identification of wireless sensor nodes
    • B. Danev and S. Capkun. Transient-based identification of wireless sensor nodes. In IPSN, 2009.
    • (2009) IPSN
    • Danev, B.1    Capkun, S.2
  • 10
    • 74049097109 scopus 로고    scopus 로고
    • On non-cooperative location privacy: A game-theoretic analysis
    • J. Freudiger, M. H. Manshaei, J.-P. Hubaux, and D. Parkes. On non-cooperative location privacy: A game-theoretic analysis. In CCS, 2009.
    • (2009) CCS
    • Freudiger, J.1    Manshaei, M.H.2    Hubaux, J.-P.3    Parkes, D.4
  • 14
    • 23944520444 scopus 로고    scopus 로고
    • Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis
    • M. Gruteser and D. Grunwald. Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis. Mob. Netw. Appl., 2005.
    • (2005) Mob. Netw. Appl.
    • Gruteser, M.1    Grunwald, D.2
  • 15
    • 11144331561 scopus 로고    scopus 로고
    • Enhancing intrusion detection in wireless networks using radio frequency fingerprinting
    • J. Hall, M. Barbeau, and E. Kranakis. Enhancing intrusion detection in wireless networks using radio frequency fingerprinting. In CIIT, 2004.
    • (2004) CIIT
    • Hall, J.1    Barbeau, M.2    Kranakis, E.3
  • 16
    • 33847315663 scopus 로고    scopus 로고
    • Protecting location privacy through path confusion
    • B. Hoh and M. Gruteser. Protecting location privacy through path confusion. In SECURECOMM, pages 194-205, 2005.
    • (2005) SECURECOMM , pp. 194-205
    • Hoh, B.1    Gruteser, M.2
  • 18
    • 33750879264 scopus 로고    scopus 로고
    • Enhancing security and privacy in traffic-monitoring systems
    • DOI 10.1109/MPRV.2006.69, 1717364
    • B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady. Enhancing security and privacy in traffic-monitoring systems. IEEE Pervasive Computing, 5(4):38-46, 2006. (Pubitemid 44717470)
    • (2006) IEEE Pervasive Computing , vol.5 , Issue.4 , pp. 38-46
    • Hoh, B.1    Gruteser, M.2    Hui, X.3    Alrabady, A.4
  • 19
    • 77953313156 scopus 로고    scopus 로고
    • Preserving privacy in GPS traces via path cloaking
    • B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady. Preserving privacy in GPS traces via path cloaking. In CCS, 2007.
    • (2007) CCS
    • Hoh, B.1    Gruteser, M.2    Xiong, H.3    Alrabady, A.4
  • 20
    • 24944489750 scopus 로고    scopus 로고
    • Enhancing wireless location privacy using silent period
    • L. Huang, K. Matsuura, H. Yamane, and K. Sezaki. Enhancing wireless location privacy using silent period. In ECNC, 2005.
    • (2005) ECNC
    • Huang, L.1    Matsuura, K.2    Yamane, H.3    Sezaki, K.4
  • 22
    • 51249095993 scopus 로고    scopus 로고
    • Inference attacks on location tracks
    • J. Krumm. Inference attacks on location tracks. In Pervasive, 2007.
    • (2007) Pervasive
    • Krumm, J.1
  • 23
    • 34247381045 scopus 로고    scopus 로고
    • Swing & swap: User centric approaches towards maximizing location privacy
    • M. Li, K. Sampigethaya, L. Huang, and R. Poovendran. Swing & swap: User centric approaches towards maximizing location privacy. In WPES, 2006.
    • (2006) WPES
    • Li, M.1    Sampigethaya, K.2    Huang, L.3    Poovendran, R.4
  • 24
    • 51349157157 scopus 로고    scopus 로고
    • Implications of radio fingerprinting on the security of sensor networks
    • B. Rasmussen and S. Capkun. Implications of radio fingerprinting on the security of sensor networks. In SECURECOMM, 2007.
    • (2007) SECURECOMM
    • Rasmussen, B.1    Capkun, S.2
  • 26
    • 2642543760 scopus 로고    scopus 로고
    • Towards an information theoretic metric for anonymity
    • A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In PET, 2002.
    • (2002) PET
    • Serjantov, A.1    Danezis, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.