-
1
-
-
85044551501
-
Reconstructing algebraic functions from mixed data
-
S. Ar, R. Lipton, R. Rubinfeld, and M. Sudan. Reconstructing algebraic functions from mixed data. Annual IEEE Symposium on Foundations of Computer Science, 0:503-512, 1992.
-
(1992)
Annual IEEE Symposium on Foundations of Computer Science
, vol.0
, pp. 503-512
-
-
Ar, S.1
Lipton, R.2
Rubinfeld, R.3
Sudan, M.4
-
2
-
-
20544471574
-
SDAR: A secure distributed anonymous routing protocol for wireless and mobile ad hoc networks
-
A. Boukerche, K. El-Khatib, L. Xu, and L. Korba. SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks. In IEEE LCN, pages 618-624, 2004.
-
(2004)
IEEE LCN
, pp. 618-624
-
-
Boukerche, A.1
El-Khatib, K.2
Xu, L.3
Korba, L.4
-
3
-
-
77951592282
-
Delay-Tolerant Networking Architecture
-
V. Cerf, S. Burleigh, A. Hooke, L. Torgerson, R. Durst, K. Scott, K. Fall, and H. Weiss. Delay-Tolerant Networking Architecture. RFC 4838, 2007.
-
(2007)
RFC
, vol.4838
-
-
Cerf, V.1
Burleigh, S.2
Hooke, A.3
Torgerson, L.4
Durst, R.5
Scott, K.6
Fall, K.7
Weiss, H.8
-
4
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
February
-
D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. CACM, 4(2), February 1981.
-
(1981)
CACM
, vol.4
, Issue.2
-
-
Chaum, D.1
-
9
-
-
1242310099
-
A delay-tolerant network architecture for challenged internets
-
K. Fall. A delay-tolerant network architecture for challenged internets. In the conference on Applications, technologies, architectures, and protocols for computer communications, pages 27-34, 2003.
-
(2003)
Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 27-34
-
-
Fall, K.1
-
11
-
-
20444439634
-
Location diversity in anonymity networks
-
N. Feamster and R. Dingledine. Location diversity in anonymity networks. In WPES, 2004.
-
(2004)
WPES
-
-
Feamster, N.1
Dingledine, R.2
-
12
-
-
77949464624
-
How much anonymity does network latency leak?
-
N. Hopper, E. Y. Vasserman, and E. Chan-Tin. How much anonymity does network latency leak? ACM Transactions on Information and System Security, 13(2):1-28, 2010.
-
(2010)
ACM Transactions on Information and System Security
, vol.13
, Issue.2
, pp. 1-28
-
-
Hopper, N.1
Vasserman, E.Y.2
Chan-Tin, E.3
-
13
-
-
66249092571
-
Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks
-
D. Huang. Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks. the International Journal of Security and Networks, 2(3/4), 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
-
-
Huang, D.1
-
16
-
-
20344383943
-
Probabilistic routing in intermittently connected networks
-
A. Lindgren, A. Doria, and O. Schelén. Probabilistic routing in intermittently connected networks. ACM SIGMOBILE Mobile Computing and Communications Review, 7(3):19-20, 2003.
-
(2003)
ACM SIGMOBILE Mobile Computing and Communications Review
, vol.7
, Issue.3
, pp. 19-20
-
-
Lindgren, A.1
Doria, A.2
Schelén, O.3
-
17
-
-
77958095223
-
Location privacy in sensor networks against a global eavesdropper
-
K. Mehta, D. Liu, and M. Wright. Location privacy in sensor networks against a global eavesdropper. In IEEE ICNP, 2007.
-
(2007)
IEEE ICNP
-
-
Mehta, K.1
Liu, D.2
Wright, M.3
-
18
-
-
50249160688
-
Sampled traffic analysis by internet-exchange-level adversaries
-
S. Murdoch and P. Zielinski. Sampled traffic analysis by internet-exchange-level adversaries. In PET, 2007.
-
(2007)
PET
-
-
Murdoch, S.1
Zielinski, P.2
-
19
-
-
33745883087
-
Anonymity, unlinkability, unobservability, pseudonymity, and identity management - A consolidated proposal for terminology
-
A. Pfitzmann and M. Hansen. Anonymity, unlinkability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology. Version v0, 27:20, 2006.
-
(2006)
Version V0
, vol.27
, pp. 20
-
-
Pfitzmann, A.1
Hansen, M.2
-
21
-
-
67650690349
-
Bundle Protocol Specification
-
K. Scott and S. Burleigh. Bundle Protocol Specification. RFC 5050, 2007.
-
(2007)
RFC
, vol.5050
-
-
Scott, K.1
Burleigh, S.2
-
22
-
-
33751073206
-
ARM: Anonymous routing protocol for mobile ad hoc networks
-
S. Seys and B. Preneel. ARM: Anonymous routing protocol for mobile ad hoc networks. In AINA, volume 2, 2006.
-
(2006)
AINA
, vol.2
-
-
Seys, S.1
Preneel, B.2
-
23
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
25
-
-
33745945444
-
AnonDSR: Efficient anonymous dynamic source routing for mobile ad-hoc networks
-
R. Song, L. Korba, and G. Yee. AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks. In SASN, 2005.
-
(2005)
SASN
-
-
Song, R.1
Korba, L.2
Yee, G.3
-
26
-
-
84863083989
-
-
Accessed August, 2009
-
Square Line Picking. http://mathworld.wolfram.com/SquareLinePicking.html. Accessed August, 2009.
-
Square Line Picking
-
-
-
27
-
-
34247251606
-
-
Internet draft, version 15
-
S. Symington, S. Farrell, H. Weiss, and P. Lovell. Bundle security protocol specification. Internet draft, version 15, 2010.
-
(2010)
Bundle Security Protocol Specification
-
-
Symington, S.1
Farrell, S.2
Weiss, H.3
Lovell, P.4
-
28
-
-
79951647380
-
-
Accessed August
-
Tor Path Specification. https://git.torproject.org/checkout/tor/master/ doc/spec/path-spec.txt. Accessed August, 2009.
-
(2009)
Tor Path Specification
-
-
-
31
-
-
33748622050
-
Mask: Anonymous on-demand routing in mobile ad hoc networks
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang. Mask: Anonymous on-demand routing in mobile ad hoc networks. IEEE transactions on wireless communications, 5(9):2376, 2006.
-
(2006)
IEEE Transactions on Wireless Communications
, vol.5
, Issue.9
, pp. 2376
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
|