-
1
-
-
27544481638
-
Mobility changes anonymity: Mobile ad hoc networks need efficient anonymous routing
-
Proceedings - 10th IEEE Symposium on Computers and Communications, ISCC 2005
-
J. Kong, X. Hong, M. Y. Sanadidi, and M. Gerla, "Mobility Changes Anonymity: Mobile Ad Hoc Networks Need Efficient Anonymous Routing," in ISCC, 2005, pp. 57-62. (Pubitemid 41543255)
-
(2005)
Proceedings - IEEE Symposium on Computers and Communications
, pp. 57-62
-
-
Kong, J.1
Hong, X.2
Sanadidi, M.Y.3
Gerla, M.4
-
2
-
-
33745883087
-
-
Tech. Rep., February
-
A. Pfitzmann and M. Hansen, "Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology," Tech. Rep., February 2008.
-
(2008)
Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology
-
-
Pfitzmann, A.1
Hansen, M.2
-
3
-
-
33748622050
-
MASK: Anonymous on-demand routing in mobile ad hoc networks
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang, "MASK: Anonymous On-demand Routing in Mobile Ad Hoc Networks," IEEE Transactions on Wireless Communications, no. 9, 2006.
-
(2006)
IEEE Transactions on Wireless Communications
, Issue.9
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
4
-
-
50049110705
-
Discount anonymous on demand routing for mobile ad hoc networks
-
L. Yang, M. Jakobsson, and S. Wetzel, "Discount Anonymous On Demand Routing for Mobile Ad Hoc Networks," SECURECOMM, vol. 6, 2006.
-
(2006)
SECURECOMM
, vol.6
-
-
Yang, L.1
Jakobsson, M.2
Wetzel, S.3
-
5
-
-
84943275480
-
Secure dynamic distributed routing algorithm for ad hoc wireless networks
-
K. El-Khatib, L. Korba, R. Song, and G. Yee, "Secure Dynamic Distributed Routing Algorithm for Ad Hoc Wireless Networks," in ICPP Workshops, 2003, pp. 359-366.
-
(2003)
ICPP Workshops
, pp. 359-366
-
-
El-Khatib, K.1
Korba, L.2
Song, R.3
Yee, G.4
-
6
-
-
79951796153
-
SDAR: A secure distributed anonymous routing protocol for wireless and mobile ad hoc networks
-
A. Boukerche, K. El-Khatib, L. Xu, and L. Korba, "SDAR: A Secure Distributed Anonymous Routing Protocol for Wireless and Mobile Ad Hoc Networks," in IEEE LCN '04, 2004.
-
(2004)
IEEE LCN '04
-
-
Boukerche, A.1
El-Khatib, K.2
Xu, L.3
Korba, L.4
-
7
-
-
20544465052
-
Anonymous secure routing in mobile ad-hoc networks
-
B. Zhu, Z. Wan, M. S. Kankanhalli, F. Bao, and R. H. Deng, "Anonymous Secure Routing in Mobile Ad-Hoc Networks," in LCN '04, 2004.
-
(2004)
LCN '04
-
-
Zhu, B.1
Wan, Z.2
Kankanhalli, M.S.3
Bao, F.4
Deng, R.H.5
-
8
-
-
33745945444
-
AnonDSR: Efficient anonymous dynamic source routing for mobile ad-hoc networks
-
DOI 10.1145/1102219.1102226, SASN'05 - Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks
-
R. Song, L. Korba, and G. Yee, "AnonDSR: Efficient Anonymous Dynamic Source Routing for Mobile Ad-hoc Networks," in SASN '05, 2005, pp. 33-42. (Pubitemid 44059928)
-
(2005)
SASN'05 - Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks
, vol.2005
, pp. 33-42
-
-
Song, R.1
Korba, L.2
Yee, G.3
-
9
-
-
0242696170
-
ANODR: Anonymous on demand routing with untraceable routes for mobile ad-hoc networks
-
J. Kong and X. Hong, "ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks," in MobiHoc '03, 2003.
-
(2003)
MobiHoc '03
-
-
Kong, J.1
Hong, X.2
-
10
-
-
33751073206
-
ARM: Anonymous routing protocol for mobile ad hoc networks
-
S. Seys and B. Preneel, "ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks," in AINA '06, 2006.
-
(2006)
AINA '06
-
-
Seys, S.1
Preneel, B.2
-
11
-
-
39049096786
-
ODAR: On-demand anonymous routing in ad hoc networks
-
D. Sy, R. Chen, and L. Bao, "ODAR: On-Demand Anonymous Routing in Ad Hoc Networks," in MASS, 2006.
-
(2006)
MASS
-
-
Sy, D.1
Chen, R.2
Bao, L.3
-
12
-
-
39349098059
-
ARMA: An efficient secure ad hoc routing protocol
-
DOI 10.1109/GLOCOM.2007.244, 4411154, IEEE GLOBECOM 2007 - 2007 IEEE Global Telecommunications Conference, Proceedings
-
A. Boukerche and Y. Ren, "ARMA: An Efficient Secure Ad Hoc Routing Protocol," in GLOBECOM, 2007, pp. 1268-1272. (Pubitemid 351259232)
-
(2007)
GLOBECOM - IEEE Global Telecommunications Conference
, pp. 1268-1272
-
-
Boukerche, A.1
Ren, Y.2
-
13
-
-
51349134049
-
A3RP: Anonymous and authenticated ad hoc routing protocol
-
J. H. Paik, B. H. Kim, and D. H. Lee, "A3RP: Anonymous and Authenticated Ad Hoc Routing Protocol," in International Conference on Information Security and Assurance, 2008, 2008.
-
(2008)
International Conference on Information Security and Assurance
, pp. 2008
-
-
Paik, J.H.1
Kim, B.H.2
Lee, D.H.3
-
14
-
-
79951796324
-
Acimn protocol: A protocol for anonymous communication in multi-hop wireless networks
-
V. Fusenig, D. Spiewak, and T. Engel, "Acimn Protocol: A Protocol for Anonymous Communication in Multi-Hop Wireless Networks," in AISC '08, 2008.
-
(2008)
AISC '08
-
-
Fusenig, V.1
Spiewak, D.2
Engel, T.3
-
18
-
-
71749091212
-
A resilient P2P anonymous routing approach employing collaboration scheme
-
J. Luo, X. Wang, and M. Yang, "A Resilient P2P Anonymous Routing Approach Employing Collaboration Scheme," J. UCS, 2009.
-
(2009)
J. UCS
-
-
Luo, J.1
Wang, X.2
Yang, M.3
-
19
-
-
79951778768
-
Towards a theory of anonymous networking
-
J. Ghaderi and R. Srikant, "Towards a Theory of Anonymous Networking," CoRR, 2009.
-
(2009)
CoRR
-
-
Ghaderi, J.1
Srikant, R.2
-
20
-
-
62349118897
-
-
J. A. Clark, J. Murdoch, J. A. Mcdermid, S. Sen, H. R. Chivers, O. Worthington, and P. Rohatgi, "Threat Modelling for Mobile Ad Hoc and Sensor Networks," 2007.
-
(2007)
Threat Modelling for Mobile Ad Hoc and Sensor Networks
-
-
Clark, J.A.1
Murdoch, J.2
Mcdermid, J.A.3
Sen, S.4
Chivers, H.R.5
Worthington, O.6
Rohatgi, P.7
-
21
-
-
0019634370
-
Password authentication with insecure communication
-
November
-
L. Lamport, "Password authentication with insecure communication," Commun. ACM, November 1981.
-
(1981)
Commun. ACM
-
-
Lamport, L.1
-
22
-
-
79951787987
-
Efficient constructions for one-way hash chains
-
Y. chun Hu, M. Jakobsson, and A. Perrig, "Efficient Constructions for One-way Hash Chains," in ACNS'03, 2003.
-
(2003)
ACNS'03
-
-
Chun Hu, Y.1
Jakobsson, M.2
Perrig, A.3
-
23
-
-
21144448874
-
Cryptographically generated addresses (CGA)
-
T. Aura, "Cryptographically Generated Addresses (CGA)," in ISC, 2003.
-
(2003)
ISC
-
-
Aura, T.1
-
24
-
-
79951785324
-
-
Wikipedia.org
-
Wikipedia.org, "Known-plaintext attack," 2010, http://en.wikipedia.org/wiki/Known-plaintextattack.
-
(2010)
Known-plaintext Attack
-
-
-
26
-
-
79951799013
-
Trusted routing for VANET
-
IEEE Computer Society
-
T. Chen, O. Mehani, and R. Boreli, "Trusted Routing for VANET," in IEEE ITST'09. IEEE Computer Society, 2009.
-
(2009)
IEEE ITST'09
-
-
Chen, T.1
Mehani, O.2
Boreli, R.3
-
28
-
-
79951807726
-
Performance evaluation of anonymous routing protocols in mobile ad-hoc networks
-
J. Liu, J. Kong, X. Hong, and M. Gerla, "Performance Evaluation of Anonymous Routing Protocols in Mobile Ad-hoc Networks," in WCNC, Las Vegas, 2005.
-
(2005)
WCNC, Las Vegas
-
-
Liu, J.1
Kong, J.2
Hong, X.3
Gerla, M.4
|