-
1
-
-
77954016786
-
Privacy-enhanced social network routing in opportunistic networks
-
doi:10.1109/PERCOMW.2010.5470511 Los Alamitos CA, USA
-
I. Parris, G. Bigwood, and T. Henderson Privacy-enhanced social network routing in opportunistic networks Proceedings of the IEEE International Workshop on SEcurity and SOCial networking (SESOC), IEEE 2010 Los Alamitos CA, USA 624 629 doi:10.1109/PERCOMW.2010.5470511
-
(2010)
Proceedings of the IEEE International Workshop on SEcurity and SOCial Networking (SESOC), IEEE
, pp. 624-629
-
-
Parris, I.1
Bigwood, G.2
Henderson, T.3
-
3
-
-
85018198247
-
-
10.1145/1452335.1452345
-
J. Crowcroft, E. Yoneki, P. Hui, and T. Henderson ACM SIGCOMM Computer Communication Review 38 5 2008 63 68 10.1145/1452335.1452345
-
(2008)
ACM SIGCOMM Computer Communication Review
, vol.38
, Issue.5
, pp. 63-68
-
-
Crowcroft, J.1
Yoneki, E.2
Hui, P.3
Henderson, T.4
-
4
-
-
0003902865
-
Epidemic Routing for Partially-Connected Ad Hoc Networks
-
Duke University (Apr. 2000)
-
A. Vahdat, D. Becker, Epidemic Routing for Partially-Connected Ad Hoc Networks, Tech. Rep. CS-200006, Duke University (Apr. 2000). URL http://issg.cs.duke.edu/epidemic/epidemic.pdf
-
Tech. Rep. CS-200006
-
-
Vahdat, A.1
Becker, D.2
-
6
-
-
57349133691
-
Bubble rap: Social-based forwarding in delay tolerant networks
-
doi:10.1145/1374618.1374652 ACM New York, NY, USA
-
P. Hui, J. Crowcroft, and E. Yoneki Bubble rap: social-based forwarding in delay tolerant networks Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) 2008 ACM New York, NY, USA 241 250 doi:10.1145/1374618.1374652
-
(2008)
Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
, pp. 241-250
-
-
Hui, P.1
Crowcroft, J.2
Yoneki, E.3
-
8
-
-
76749148687
-
SimBetAge: Utilizing temporal changes in social networks for pocket switched networks
-
doi:10.1145/1659029.1659034 ACM Press New York, NY, USA
-
J.A. Bitsch Link, N. Viol, A. Goliath, and K. Wehrle SimBetAge: utilizing temporal changes in social networks for pocket switched networks Proceedings of the 1st ACM Workshop on User-provided Networking: Challenges and Opportunities (U-NET) 2009 ACM Press New York, NY, USA 13 18 doi:10.1145/1659029.1659034
-
(2009)
Proceedings of the 1st ACM Workshop on User-provided Networking: Challenges and Opportunities (U-NET)
, pp. 13-18
-
-
Bitsch Link, J.A.1
Viol, N.2
Goliath, A.3
Wehrle, K.4
-
9
-
-
74349118836
-
Habit: Leveraging human mobility and social network for efficient content dissemination in delay tolerant networks
-
doi:10.1109/WOWMOM.2009.5282467
-
A.J. Mashhadi, S.B. Mokhtar, L. Capra, Habit: leveraging human mobility and social network for efficient content dissemination in delay tolerant networks, in: Proceedings of the 10th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2009, pp. 1-6. doi:10.1109/WOWMOM.2009.5282467.
-
(2009)
Proceedings of the 10th IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)
, pp. 1-6
-
-
Mashhadi, A.J.1
Mokhtar, S.B.2
Capra, L.3
-
10
-
-
77953306838
-
PeopleRank: Social opportunistic forwarding
-
doi:10.1109/INFCOM.2010.5462261 Los Alamitos CA, USA
-
A. Mtibaa, M. May, C. Diot, and M. Ammar PeopleRank: social opportunistic forwarding Proceedings of the IEEE INFOCOM 2010 Mini-Conference, IEEE 2010 Los Alamitos CA, USA doi:10.1109/INFCOM.2010.5462261
-
(2010)
Proceedings of the IEEE INFOCOM 2010 Mini-Conference, IEEE
-
-
Mtibaa, A.1
May, M.2
Diot, C.3
Ammar, M.4
-
11
-
-
56749091843
-
Exploiting self-reported social networks for routing in ubiquitous computing environments
-
doi:10.1109/WiMob.2008.86 Los Alamitos CA, USA
-
G. Bigwood, D. Rehunathan, M. Bateman, T. Henderson, and S. Bhatti Exploiting self-reported social networks for routing in ubiquitous computing environments Proceedings of the 1st International Workshop on Social Aspects of Ubiquitous Computing Environments (SAUCE) 2008 Los Alamitos CA, USA 484 489 doi:10.1109/WiMob.2008.86
-
(2008)
Proceedings of the 1st International Workshop on Social Aspects of Ubiquitous Computing Environments (SAUCE)
, pp. 484-489
-
-
Bigwood, G.1
Rehunathan, D.2
Bateman, M.3
Henderson, T.4
Bhatti, S.5
-
15
-
-
72949107570
-
The concept of opportunistic networks and their research challenges in privacy and security
-
doi:10.1007/978-0-387-71058-7-5 Springer US, Boston, MA, USA Chapter 5
-
L. Lilien, Z.H. Kamal, V. Bhuse, and A. Gupta The concept of opportunistic networks and their research challenges in privacy and security Mobile and Wireless Network Security and Privacy 2007 Springer US, Boston, MA, USA 85 117 Chapter 5, doi:10.1007/978-0-387-71058-7-5
-
(2007)
Mobile and Wireless Network Security and Privacy
, pp. 85-117
-
-
Lilien, L.1
Kamal, Z.H.2
Bhuse, V.3
Gupta, A.4
-
18
-
-
70450250238
-
PEON: Privacy-enhanced opportunistic networks with applications in assistive environments
-
doi:10.1145/1579114.1579190 ACM Press New York, NY, USA
-
Z. Le, G. Vakde, and M. Wright PEON: privacy-enhanced opportunistic networks with applications in assistive environments Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments (PETRA) 2009 ACM Press New York, NY, USA 1 8 doi:10.1145/1579114. 1579190
-
(2009)
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments (PETRA)
, pp. 1-8
-
-
Le, Z.1
Vakde, G.2
Wright, M.3
-
19
-
-
79958707212
-
TrackMeNot: Resisting surveillance in web search
-
I. Kerr, V. Steeves, C. Lucock, Oxford University Press Oxford, UK Chapter 23
-
D.C. Howe, and H. Nissenbaum TrackMeNot: resisting surveillance in web search I. Kerr, V. Steeves, C. Lucock, Lessons from the Identity Trail: Anonymity, Privacy, and Identity in a Networked Society 2009 Oxford University Press Oxford, UK 417 436 Chapter 23
-
(2009)
Lessons from the Identity Trail: Anonymity, Privacy, and Identity in A Networked Society
, pp. 417-436
-
-
Howe, D.C.1
Nissenbaum, H.2
-
20
-
-
77955660918
-
-
10.1016/j.comnet.2009.11.003
-
A. Viejo, and J. Castell-Roca Computer Networks 54 9 2010 1343 1357 10.1016/j.comnet.2009.11.003
-
(2010)
Computer Networks
, vol.54
, Issue.9
, pp. 1343-1357
-
-
Viejo, A.1
Castell-Roca, J.2
-
21
-
-
70249088359
-
NOYB: Privacy in online social networks
-
doi:10.1145/1397735.1397747 ACM New York, NY, USA
-
S. Guha, K. Tang, and P. Francis NOYB: privacy in online social networks Proceedings of the 1st Workshop on Online Social Networks (WOSN) 2008 ACM New York, NY, USA 49 54 doi:10.1145/1397735.1397747
-
(2008)
Proceedings of the 1st Workshop on Online Social Networks (WOSN)
, pp. 49-54
-
-
Guha, S.1
Tang, K.2
Francis, P.3
-
24
-
-
77955214796
-
A practical attack to de-anonymize social network users
-
doi:10.1109/SP.2010.21 Los Alamitos CA, USA
-
G. Wondracek, T. Holz, E. Kirda, and C. Kruegel A practical attack to de-anonymize social network users Proceedings of the 31st IEEE Symposium on Security and Privacy, IEEE 2010 Los Alamitos CA, USA 223 238 doi:10.1109/SP.2010.21
-
(2010)
Proceedings of the 31st IEEE Symposium on Security and Privacy, IEEE
, pp. 223-238
-
-
Wondracek, G.1
Holz, T.2
Kirda, E.3
Kruegel, C.4
-
28
-
-
0014814325
-
-
10.1145/362686.362692
-
B.H. Bloom Communications of the ACM 13 7 1970 422 426 10.1145/362686.362692
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
29
-
-
35248858454
-
Making a faster cryptanalytic time-memory trade-off
-
Springer Berlin, Germany URL
-
P. Oechslin Making a faster cryptanalytic time-memory trade-off Proceedings of Advances in Cryptology (CRYPTO 2003) 2003 Springer Berlin, Germany 617 630 URL http://www.springerlink.com/content/U9GXWD29P2TNX3WL
-
(2003)
Proceedings of Advances in Cryptology (CRYPTO 2003)
, pp. 617-630
-
-
Oechslin, P.1
-
30
-
-
57349146644
-
Working day movement model
-
doi:10.1145/1374688.1374695 ACM New York, NY, USA
-
F. Ekman, A. Keränen, J. Karvo, and J. Ott Working day movement model Proceedings of the 1st ACM SIGMOBILE Workshop on Mobility Models (MobilityModels) 2008 ACM New York, NY, USA 33 40 doi:10.1145/1374688.1374695
-
(2008)
Proceedings of the 1st ACM SIGMOBILE Workshop on Mobility Models (MobilityModels)
, pp. 33-40
-
-
Ekman, F.1
Keränen, A.2
Karvo, J.3
Ott, J.4
-
31
-
-
4444324425
-
Locating cache proxies in MANETs
-
doi:10.1145/989459.989482 ACM New York, NY, USA
-
R. Friedman, M. Gradinariu, and G. Simon Locating cache proxies in MANETs Proceedings of the 5th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) 2004 ACM New York, NY, USA 175 186 doi:10.1145/989459. 989482
-
(2004)
Proceedings of the 5th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
, pp. 175-186
-
-
Friedman, R.1
Gradinariu, M.2
Simon, G.3
-
35
-
-
33751032920
-
Analysis and implications of student contact patterns derived from campus schedules
-
doi:10.1145/1161089.1161100 ACM New York, NY, USA
-
V. Srinivasan, M. Motani, and W.T. Ooi Analysis and implications of student contact patterns derived from campus schedules Proceedings of the 12th Annual International Conference on Mobile Computing and Networking (MobiCom) 2006 ACM New York, NY, USA 86 97 doi:10.1145/1161089.1161100
-
(2006)
Proceedings of the 12th Annual International Conference on Mobile Computing and Networking (MobiCom)
, pp. 86-97
-
-
Srinivasan, V.1
Motani, M.2
Ooi, W.T.3
-
38
-
-
1242310099
-
A delay-tolerant network architecture for challenged internets
-
doi:10.1145/863955.863960 ACM New York, NY, USA
-
K. Fall A delay-tolerant network architecture for challenged internets Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM) 2003 ACM New York, NY, USA 27 34 doi:10.1145/863955.863960
-
(2003)
Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM)
, pp. 27-34
-
-
Fall, K.1
|