-
1
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
February
-
D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Communications of the ACM, vol. 24, February 1981.
-
(1981)
Communications of the ACM
, vol.24
-
-
Chaum, D.1
-
2
-
-
0023861309
-
The dinning cryptographer problem: Unconditional sender and recipient untraceability
-
D. Chaum, "The dinning cryptographer problem: Unconditional sender and recipient untraceability," Journal of Cryptology, vol. 1, no. 1, pp. 65-75, 1988.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
3
-
-
14844282596
-
k-anonymous message transmission
-
L. von Ahn, A. Bortz, and N. Hopper, "k-anonymous message transmission," in Proceedings of CCS, (Washington D.C., USA.), pp. 122-130, 2003.
-
(2003)
Proceedings of CCS, (Washington D.C., USA.)
, pp. 122-130
-
-
Von Ahn, L.1
Bortz, A.2
Hopper, N.3
-
4
-
-
0032074579
-
Anonymous connections and onion routing
-
M. Reed, P. Syverson, and D. Goldschlag, "Anonymous connections and onion routing," IEEE J. on Selected Areas in Coomunications, vol. 16, no. 4, pp. 482-494, 1998.
-
(1998)
IEEE J. on Selected Areas in Coomunications
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.1
Syverson, P.2
Goldschlag, D.3
-
5
-
-
0002054934
-
Crowds: Anonymity for web transaction
-
M. Reiter and A. Rubin, "Crowds: anonymity for web transaction," ACM Transactions on Information and System Security, vol. 1, no. 1, pp. 66-92, 1998.
-
(1998)
ACM Transactions on Information and System Security
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.1
Rubin, A.2
-
7
-
-
33847297141
-
Countermeasures against traffic analysis attacks in wireless sensor networks
-
Sept.
-
J. Deng, R. Han, and S. Mishra, "Countermeasures against traffic analysis attacks in wireless sensor networks," SecureComm 2005, pp. 113-126, Sept. 2005.
-
(2005)
SecureComm 2005
, pp. 113-126
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
8
-
-
55149095912
-
A novel scheme for protecting receiver's location privacy in wireless sensor networks
-
October
-
Y. Jian, S. Chen, Z. Zhang, and L. Zhang, "A novel scheme for protecting receiver's location privacy in wireless sensor networks," Wireless Communications, IEEE Transactions on, vol. 7, pp. 3769-3779, October 2008.
-
(2008)
Wireless Communications, IEEE Transactions on
, vol.7
, pp. 3769-3779
-
-
Jian, Y.1
Chen, S.2
Zhang, Z.3
Zhang, L.4
-
9
-
-
56749163645
-
Towards event source unobservability with minimum network traffic in sensor networks
-
ACM
-
Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao, "Towards event source unobservability with minimum network traffic in sensor networks," in WiSec '08: Proceedings of the first ACM conference on Wireless network security, (New York, NY, USA), pp. 77-88, ACM, 2008.
-
(2008)
WiSec '08: Proceedings of the First ACM Conference on Wireless Network Security, (New York, NY, USA)
, pp. 77-88
-
-
Yang, Y.1
Shao, M.2
Zhu, S.3
Urgaonkar, B.4
Cao, G.5
-
10
-
-
51349086896
-
Towards statistically strong source anonymity for sensor networks
-
April
-
M. Shao, Y. Yang, S. Zhu, and G. Cao, "Towards statistically strong source anonymity for sensor networks," INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, pp. 51-55, April 2008.
-
(2008)
INFOCOM 2008. The 27th Conference on Computer Communications. IEEE
, pp. 51-55
-
-
Shao, M.1
Yang, Y.2
Zhu, S.3
Cao, G.4
-
11
-
-
27944449345
-
Enhancing sourcelocation privacy in sensor network routing
-
June
-
P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, "Enhancing sourcelocation privacy in sensor network routing," Distributed Computing Systems, 2005. ICDCS 2005. Proceedings. 25th IEEE International Conference on, pp. 599-608, June 2005.
-
(2005)
Distributed Computing Systems, 2005. ICDCS 2005. Proceedings. 25th IEEE International Conference on
, pp. 599-608
-
-
Kamat, P.1
Zhang, Y.2
Trappe, W.3
Ozturk, C.4
-
12
-
-
33847141964
-
Preserving source location privacy in monitoring-based wireless sensor networks
-
IEEE
-
Y. Xi, L. Schwiebert, and W. Shi, "Preserving source location privacy in monitoring-based wireless sensor networks.," in IPDPS, IEEE, 2006.
-
(2006)
IPDPS
-
-
Xi, Y.1
Schwiebert, L.2
Shi, W.3
-
13
-
-
70449419921
-
Routing-based source-location privacy protection in wireless sensor networks
-
Y. Li, L. Lightfoot, and J. Ren, "Routing-based source-location privacy protection in wireless sensor networks," in IEEE EIT 2009, (Windsor, Ontario, Canada), June 7-9 2009.
-
IEEE EIT 2009, (Windsor, Ontario, Canada), June 7-9 2009
-
-
Li, Y.1
Lightfoot, L.2
Ren, J.3
-
14
-
-
85164891669
-
-
http://www.panda.org/.
-
-
-
-
15
-
-
28444435923
-
Eecs: An energy efficient clustering scheme in wireless sensor networks
-
April
-
M. Ye, C. Li, G. Chen, and J. Wu, "Eecs: an energy efficient clustering scheme in wireless sensor networks," IPCCC 2005, pp. 535-540, April 2005.
-
(2005)
IPCCC 2005
, pp. 535-540
-
-
Ye, M.1
Li, C.2
Chen, G.3
Wu, J.4
-
17
-
-
33750394324
-
Asymmetric multihop communication in large sensor networks
-
Jan.
-
J. Neander, E. Hansen, M. Nolin, and M. Bjorkman, "Asymmetric multihop communication in large sensor networks," Wireless Pervasive Computing, 2006 1st International Symposium on, pp. 7 pp.-, Jan. 2006.
-
(2006)
Wireless Pervasive Computing, 2006 1st International Symposium on
, pp. 7
-
-
Neander, J.1
Hansen, E.2
Nolin, M.3
Bjorkman, M.4
-
18
-
-
10944266504
-
Heed: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks
-
Oct.-Dec.
-
O. Younis and S. Fahmy, "Heed: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks," Mobile Computing, IEEE Transactions on, vol. 3, pp. 366-379, Oct.-Dec. 2004.
-
(2004)
Mobile Computing, IEEE Transactions on
, vol.3
, pp. 366-379
-
-
Younis, O.1
Fahmy, S.2
-
19
-
-
33947309703
-
Secure localization and authentication in ultra-wideband sensor networks
-
April
-
Y. Zhang, W. Liu, Y. Fang, and D. Wu, "Secure localization and authentication in ultra-wideband sensor networks," Selected Areas in Communications, IEEE Journal on, vol. 24, pp. 829-835, April 2006.
-
(2006)
Selected Areas in Communications, IEEE Journal on
, vol.24
, pp. 829-835
-
-
Zhang, Y.1
Liu, W.2
Fang, Y.3
Wu, D.4
-
23
-
-
25844435733
-
Pike: Peer intermediaries for key establishment in sensor networks
-
vol. 1, March
-
H. Chan and A. Perrig, "Pike: peer intermediaries for key establishment in sensor networks," INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE, vol. 1, pp. 524-535 vol. 1, March 2005.
-
(2005)
INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE
, vol.1
, pp. 524-535
-
-
Chan, H.1
Perrig, A.2
-
24
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar, "SPINS: Security protocols for sensor networks," in Seventh Annual International Conference on Mobile Computing and Networks (MobiCOM 2001), (Rome, Italy), July 2001.
-
Seventh Annual International Conference on Mobile Computing and Networks (MobiCOM 2001), (Rome, Italy), July 2001
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
25
-
-
34247606829
-
Efficient hybrid security mechanisms for heterogeneous sensor networks
-
June
-
P. Traynor, R. Kumar, H. Choi, G. Cao, S. Zhu, and T. La Porta, "Efficient hybrid security mechanisms for heterogeneous sensor networks," Mobile Computing, IEEE Transactions on, vol. 6, pp. 663-677, June 2007.
-
(2007)
Mobile Computing, IEEE Transactions on
, vol.6
, pp. 663-677
-
-
Traynor, P.1
Kumar, R.2
Choi, H.3
Cao, G.4
Zhu, S.5
La Porta, T.6
|