메뉴 건너뛰기




Volumn , Issue , 2010, Pages 587-592

Toward anonymity in delay tolerant networks: Threshold pivot scheme

Author keywords

[No Author keywords available]

Indexed keywords

CONFIGURABLE; DELAY TOLERANT NETWORKS; END-TO-END CONNECTIVITY; MOBILE NODES; NETWORK COMMUNICATIONS; OPTIMAL MODEL; PHYSICAL LOCATIONS; REAL-WORLD; SECRET SHARING; SECURITY PRIMITIVES; TRAFFIC ANALYSIS; UNLINKABILITY; VEHICULAR ENVIRONMENTS;

EID: 79951660476     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MILCOM.2010.5680442     Document Type: Conference Paper
Times cited : (23)

References (32)
  • 2
    • 20544471574 scopus 로고    scopus 로고
    • SDAR: A secure distributed anonymous routing protocol for wireless and mobile ad hoc networks
    • A. Boukerche, K. El-Khatib, L. Xu, and L. Korba. SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks. In IEEE LCN, pages 618-624, 2004.
    • (2004) IEEE LCN , pp. 618-624
    • Boukerche, A.1    El-Khatib, K.2    Xu, L.3    Korba, L.4
  • 4
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • February
    • D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. CACM, 4(2), February 1981.
    • (1981) CACM , vol.4 , Issue.2
    • Chaum, D.1
  • 11
    • 20444439634 scopus 로고    scopus 로고
    • Location diversity in anonymity networks
    • N. Feamster and R. Dingledine. Location diversity in anonymity networks. In WPES, 2004.
    • (2004) WPES
    • Feamster, N.1    Dingledine, R.2
  • 13
    • 66249092571 scopus 로고    scopus 로고
    • Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks
    • D. Huang. Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks. the International Journal of Security and Networks, 2(3/4), 2007.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4
    • Huang, D.1
  • 14
    • 51349159708 scopus 로고    scopus 로고
    • Anonymity and security in delay tolerant networks
    • A. Kate, G. Zaverucha, and U. Hengartner. Anonymity and security in delay tolerant networks. In SecureComm, 2007.
    • (2007) SecureComm
    • Kate, A.1    Zaverucha, G.2    Hengartner, U.3
  • 15
  • 17
    • 77958095223 scopus 로고    scopus 로고
    • Location privacy in sensor networks against a global eavesdropper
    • K. Mehta, D. Liu, and M. Wright. Location privacy in sensor networks against a global eavesdropper. In IEEE ICNP, 2007.
    • (2007) IEEE ICNP
    • Mehta, K.1    Liu, D.2    Wright, M.3
  • 18
    • 50249160688 scopus 로고    scopus 로고
    • Sampled traffic analysis by internet-exchange-level adversaries
    • S. Murdoch and P. Zielinski. Sampled traffic analysis by internet-exchange-level adversaries. In PET, 2007.
    • (2007) PET
    • Murdoch, S.1    Zielinski, P.2
  • 19
    • 33745883087 scopus 로고    scopus 로고
    • Anonymity, unlinkability, unobservability, pseudonymity, and identity management - A consolidated proposal for terminology
    • A. Pfitzmann and M. Hansen. Anonymity, unlinkability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology. Version v0, 27:20, 2006.
    • (2006) Version V0 , vol.27 , pp. 20
    • Pfitzmann, A.1    Hansen, M.2
  • 20
    • 70349695997 scopus 로고    scopus 로고
    • Delivery properties of human social networks
    • N. Sastry, K. Sollins, and J. Crowcroft. Delivery properties of human social networks. In INFOCOM, 2009.
    • (2009) INFOCOM
    • Sastry, N.1    Sollins, K.2    Crowcroft, J.3
  • 21
    • 67650690349 scopus 로고    scopus 로고
    • Bundle Protocol Specification
    • K. Scott and S. Burleigh. Bundle Protocol Specification. RFC 5050, 2007.
    • (2007) RFC , vol.5050
    • Scott, K.1    Burleigh, S.2
  • 22
    • 33751073206 scopus 로고    scopus 로고
    • ARM: Anonymous routing protocol for mobile ad hoc networks
    • S. Seys and B. Preneel. ARM: Anonymous routing protocol for mobile ad hoc networks. In AINA, volume 2, 2006.
    • (2006) AINA , vol.2
    • Seys, S.1    Preneel, B.2
  • 23
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 24
  • 25
    • 33745945444 scopus 로고    scopus 로고
    • AnonDSR: Efficient anonymous dynamic source routing for mobile ad-hoc networks
    • R. Song, L. Korba, and G. Yee. AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks. In SASN, 2005.
    • (2005) SASN
    • Song, R.1    Korba, L.2    Yee, G.3
  • 26
    • 84863083989 scopus 로고    scopus 로고
    • Accessed August, 2009
    • Square Line Picking. http://mathworld.wolfram.com/SquareLinePicking.html. Accessed August, 2009.
    • Square Line Picking
  • 28
    • 79951647380 scopus 로고    scopus 로고
    • Accessed August
    • Tor Path Specification. https://git.torproject.org/checkout/tor/master/ doc/spec/path-spec.txt. Accessed August, 2009.
    • (2009) Tor Path Specification
  • 29
    • 78650117154 scopus 로고    scopus 로고
    • Hashing it out in public
    • A. Tran, N. Hopper, and Y. Kim. Hashing it out in public. In WPES, 2009.
    • (2009) WPES
    • Tran, A.1    Hopper, N.2    Kim, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.