-
1
-
-
27944449345
-
Enhancing Source-Location Privacy in Sensor Network Routing
-
P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, "Enhancing Source- Location Privacy in Sensor Network Routing", Proc. IEEE ICDCS'05, pp. 599-608, 2005.
-
(2005)
Proc. IEEE ICDCS'05
, pp. 599-608
-
-
Kamat, P.1
Zhang, Y.2
Trappe, W.3
Ozturk, C.4
-
2
-
-
38549121414
-
ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks
-
X. Lin, R. Lu, H. Zhu, P.-H. Ho, X. Shen and Z. Cao, "ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks", Proc. IEEE ICC'07, pp. 1247-1253, 2007.
-
(2007)
Proc. IEEE ICC'07
, pp. 1247-1253
-
-
Lin, X.1
Lu, R.2
Zhu, H.3
Ho, P.-H.4
Shen, X.5
Cao, Z.6
-
3
-
-
14744270678
-
Technology and Web User Data Privacy - A Survey of Risks and Countermeasures
-
J. Linn, "Technology and Web User Data Privacy - a Survey of Risks and Countermeasures", IEEE Security & Privacy, vol. 3, no. 1, pp. 52-58, 2005.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.1
, pp. 52-58
-
-
Linn, J.1
-
4
-
-
51349086896
-
Towards Statistically Strong Source Anonymity for Sensor Networks
-
M. Shao, Y. Yang, S. Zhu, and G. Cao, "Towards Statistically Strong Source Anonymity for Sensor Networks", Proc. IEEE INFOCOM'08, pp. 51-55, 2008.
-
(2008)
Proc. IEEE INFOCOM'08
, pp. 51-55
-
-
Shao, M.1
Yang, Y.2
Zhu, S.3
Cao, G.4
-
5
-
-
67349253018
-
Sage: A Strong Privacy-Preserving Scheme against Global Eavesdropping for E-health Systems
-
X. Lin, R. Lu, X. Shen, Y. Nemoto, and N. Kato, "Sage: A Strong Privacy-Preserving Scheme against Global Eavesdropping for E-health Systems", IEEE Journal on Selected Areas in Communications, vol. 27, no. 4, pp. 365-378, 2009.
-
(2009)
IEEE Journal on Selected Areas in Communications
, vol.27
, Issue.4
, pp. 365-378
-
-
Lin, X.1
Lu, R.2
Shen, X.3
Nemoto, Y.4
Kato, N.5
-
6
-
-
56749163645
-
Towards Event Source Unobservability with Minimum Network Traffic in Sensor Networks
-
Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao, "Towards Event Source Unobservability with Minimum Network Traffic in Sensor Networks", Proc. of ACM WiSec'08, pp. 77-88, 2008.
-
(2008)
Proc. of ACM WiSec'08
, pp. 77-88
-
-
Yang, Y.1
Shao, M.2
Zhu, S.3
Urgaonkar, B.4
Cao, G.5
-
7
-
-
0034229404
-
Network Information Flow
-
Jul.
-
R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung, "Network Information Flow", IEEE Trans. on Information Theory, vol. 46, no. 4, pp. 1204-1216, Jul. 2000.
-
(2000)
IEEE Trans. on Information Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.-Y.R.3
Yeung, R.W.4
-
8
-
-
70349682315
-
An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding
-
Y. Fan, Y. Jiang, H. Zhu, and X. Shen, "An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding", Proc. IEEE INFOCOM'09, pp. 2213-2221, 2009.
-
(2009)
Proc. IEEE INFOCOM'09
, pp. 2213-2221
-
-
Fan, Y.1
Jiang, Y.2
Zhu, H.3
Shen, X.4
-
9
-
-
33745883087
-
-
v0.31, Feb. 15
-
A. Pfitzmann and M. Hansen, "Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology", v0.31, Feb. 15, 2008.
-
(2008)
Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology
-
-
Pfitzmann, A.1
Hansen, M.2
-
10
-
-
33947399169
-
A Random Linear Network Coding Approach to Multicast
-
T. Ho, M. Medard, R. Koetter, D.R. Karger, M. Effros, J. Shi, and B. Leong, "A Random Linear Network Coding Approach to Multicast", IEEE Trans. on Information Theory, vol. 52, no. 10, pp. 4413-4430, 2006.
-
(2006)
IEEE Trans. on Information Theory
, vol.52
, Issue.10
, pp. 4413-4430
-
-
Ho, T.1
Medard, M.2
Koetter, R.3
Karger, D.R.4
Effros, M.5
Shi, J.6
Leong, B.7
-
11
-
-
84942550998
-
Public-Key Cryptosystems Based on Composite Degree Residuocity Classes
-
Proc. EUROCRYPT'99
-
P. Paillier, "Public-Key Cryptosystems Based on Composite Degree Residuocity Classes", Proc. EUROCRYPT'99, LNCS, vol. 1592, pp. 223-238, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
13
-
-
58149107090
-
On the Impact of Coarse Synchronization on the Performance of Broadcast/Multicast Single Frequency Network Operation in WCDMA
-
C.A. Jotten, C. Sgraja, and J.J. Blanz, "On the Impact of Coarse Synchronization on the Performance of Broadcast/Multicast Single Frequency Network Operation in WCDMA", Proc. IEEE 68th Vehicular Technology Conference, pp. 1-6, 2008.
-
(2008)
Proc. IEEE 68th Vehicular Technology Conference
, pp. 1-6
-
-
Jotten, C.A.1
Sgraja, C.2
Blanz, J.J.3
-
14
-
-
10044284351
-
Leap: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks
-
S. Zhu, S. Setia, and S. Jajodia, "Leap: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks", ACM CCS, pp. 62-72, 2003.
-
(2003)
ACM CCS
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
|