-
1
-
-
33748622050
-
MASK: Anonymous on-demand routing in mobile Ad Hoc networks
-
DOI 10.1109/TWC.2006.1687761, 1687761
-
W.L. Yanchao Zhang, Wei Liu, and Y. Fang MASK: anonymous on-demand routing in mobile ad hoc networks Transactions on Wireless Communications vol. 21 2006 IEEE 2376 2385 (Pubitemid 44376150)
-
(2006)
IEEE Transactions on Wireless Communications
, vol.5
, Issue.9
, pp. 2376-2385
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
2
-
-
50049110705
-
Discount anonymous on demand routing for mobile ad hoc networks
-
L. Yang, M. Jakobsson, S. Wetzel, Discount anonymous on demand routing for mobile ad hoc networks, in: SECURECOMM, vol. 6, 2006.
-
(2006)
SECURECOMM
, vol.6
-
-
Yang, L.1
Jakobsson, M.2
Wetzel, S.3
-
3
-
-
84943275480
-
Secure dynamic distributed routing algorithm for ad hoc wireless networks
-
K. El-Khatib, L. Korba, R. Song, G. Yee, Secure dynamic distributed routing algorithm for ad hoc wireless networks, in: ICPP Workshops, 2003, pp. 359-366.
-
(2003)
ICPP Workshops
, pp. 359-366
-
-
El-Khatib, K.1
Korba, L.2
Song, R.3
Yee, G.4
-
4
-
-
33745945444
-
AnonDSR: Efficient anonymous dynamic source routing for mobile ad-hoc networks
-
DOI 10.1145/1102219.1102226, SASN'05 - Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks
-
R. Song, L. Korba, G. Yee, AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks, in: SASN '05, 2005, pp. 33-42. (Pubitemid 44059928)
-
(2005)
SASN'05 - Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks
, vol.2005
, pp. 33-42
-
-
Song, R.1
Korba, L.2
Yee, G.3
-
5
-
-
20544471574
-
SDAR: A Secure Distributed Anonymous Routing protocol for wireless and mobile ad hoc networks
-
Proceedings - 29th Annual IEEE International Conference on Local Computer Networks, LCN 2004
-
A. Boukerche, K. El-Khatib, L. Xu, L. Korba, SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks, in: Annual IEEE Conference onLocal Computer Networks, 2004, pp. 618-624. (Pubitemid 40845289)
-
(2004)
Proceedings - Conference on Local Computer Networks, LCN
, pp. 618-624
-
-
Boukerche, A.1
El-Khatib, K.2
Xu, L.3
Korba, L.4
-
7
-
-
20544465052
-
Anonymous secure routing in mobile ad-hoc networks
-
Proceedings - 29th Annual IEEE International Conference on Local Computer Networks, LCN 2004
-
B. Zhu, Z. Wan, M.S. Kankanhalli, F. Bao, and R.H. Deng Anonymous secure routing in mobile ad-hoc networks Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks, LCN '04 2004 IEEE Computer Society 102 108 (Pubitemid 40845199)
-
(2004)
Proceedings - Conference on Local Computer Networks, LCN
, pp. 102-108
-
-
Zhu, B.1
Wan, Z.2
Kankanhalli, M.S.3
Bao, F.4
Deng, R.H.5
-
8
-
-
70350090613
-
ARM: Anonymous routing protocol for mobile ad hoc networks
-
S. Seys, and B. Preneel ARM: anonymous routing protocol for mobile ad hoc networks Int. J. Wire. Mob. Comput. 3 2009 145 155
-
(2009)
Int. J. Wire. Mob. Comput.
, vol.3
, pp. 145-155
-
-
Seys, S.1
Preneel, B.2
-
9
-
-
39049096786
-
ODAR: On-demand anonymous routing in ad hoc networks
-
D. Sy, R. Chen, L. Bao, ODAR: on-demand anonymous routing in ad hoc networks, in: Proceedings of The Third IEEE International Conference on Mobile Ad-hoc and Sensor Systems MASS, 2006, pp. 267-276.
-
(2006)
Proceedings of the Third IEEE International Conference on Mobile Ad-hoc and Sensor Systems MASS
, pp. 267-276
-
-
Sy, D.1
Chen, R.2
Bao, L.3
-
10
-
-
39349098059
-
ARMA: An efficient secure ad hoc routing protocol
-
DOI 10.1109/GLOCOM.2007.244, 4411154, IEEE GLOBECOM 2007 - 2007 IEEE Global Telecommunications Conference, Proceedings
-
A. Boukerche, Y. Ren, ARMA: an efficient secure ad hoc routing protocol, in: GLOBECOM, 2007, pp. 1268-1272. (Pubitemid 351259232)
-
(2007)
GLOBECOM - IEEE Global Telecommunications Conference
, pp. 1268-1272
-
-
Boukerche, A.1
Ren, Y.2
-
12
-
-
84871244307
-
Acimn protocol: A protocol for anonymous communication in multi-hop wireless networks
-
Australian Computer Society, Inc
-
V. Fusenig, D. Spiewak, and T. Engel Acimn protocol: a protocol for anonymous communication in multi-hop wireless networks Proceedings of AISC 2008 Australian Computer Society, Inc 107 114
-
(2008)
Proceedings of AISC
, pp. 107-114
-
-
Fusenig, V.1
Spiewak, D.2
Engel, T.3
-
13
-
-
71749091212
-
A resilient P2P anonymous routing approach employing collaboration scheme
-
J. Luo, X. Wang, and M. Yang A resilient P2P anonymous routing approach employing collaboration scheme J. UCS 15 9 2009 1797 1811
-
(2009)
J. UCS
, vol.15
, Issue.9
, pp. 1797-1811
-
-
Luo, J.1
Wang, X.2
Yang, M.3
-
16
-
-
27544481638
-
Mobility changes anonymity: Mobile ad hoc networks need efficient anonymous routing
-
Proceedings - 10th IEEE Symposium on Computers and Communications, ISCC 2005
-
J. Kong Mobility changes anonymity: mobile ad hoc networks need efficient anonymous routing Proceedings of the 10th IEEE Symposium on Computers and Communications 2005 IEEE Computer Society 57 62 (Pubitemid 41543255)
-
(2005)
Proceedings - IEEE Symposium on Computers and Communications
, pp. 57-62
-
-
Kong, J.1
Hong, X.2
Sanadidi, M.Y.3
Gerla, M.4
-
17
-
-
33745883087
-
-
Tech. Rep. (February)
-
A. Pfitzmann, M. Hansen, Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology, Tech. Rep. (February 2008).
-
(2008)
Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology
-
-
Pfitzmann, A.1
Hansen, M.2
-
18
-
-
79951792479
-
TARo: Trusted anonymous routing for MANETs
-
IEEE Computer Society
-
J.T. Chen, R. Boreli, V. Sivaraman, TARo: trusted anonymous routing for MANETs, in: Sixth IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom-10), IEEE Computer Society, 2010, pp. 756-762.
-
(2010)
Sixth IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom-10)
, pp. 756-762
-
-
Chen, J.T.1
Boreli, R.2
Sivaraman, V.3
-
19
-
-
0008128972
-
Networks without user observability-design options
-
A. Pfitzmann, and M. Waidner Networks without user observability-design options EUROCRYPT 85 1986 245 253
-
(1986)
EUROCRYPT
, vol.85
, pp. 245-253
-
-
Pfitzmann, A.1
Waidner, M.2
-
22
-
-
0038345770
-
An Architecture for an Anonymity Network
-
M. Rennhard, B. Plattner, S. Rafaeli, L. Mathy, D. Hutchison, An Architecture for an Anonymity Network, IEEE International Workshops on Enabling Technologies, 2001, p. 165.
-
(2001)
IEEE International Workshops on Enabling Technologies
, pp. 165
-
-
Rennhard, M.1
Plattner, B.2
Rafaeli, S.3
Mathy, L.4
Hutchison, D.5
-
24
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport Password authentication with insecure communication Commun. ACM 24 1981 770 772
-
(1981)
Commun. ACM
, vol.24
, pp. 770-772
-
-
Lamport, L.1
-
25
-
-
26444506296
-
Efficient constructions for one-way hash chains
-
Y. Chun Hu, M. Jakobsson, A. Perrig, Efficient constructions for one-way hash chains, in: Applied Cryptography and Network Security (ACNS), 2003, pp. 423-441.
-
(2003)
Applied Cryptography and Network Security (ACNS)
, pp. 423-441
-
-
Chun Hu, Y.1
Jakobsson, M.2
Perrig, A.3
-
29
-
-
47249098347
-
Performance evaluation of an anonymous routing protocol using mobile agents for wireless ad shoc networks
-
IEEE Computer Society
-
A. Boukerche, Y. Ren, and Z. Zhang Performance evaluation of an anonymous routing protocol using mobile agents for wireless ad shoc networks Proceedings of the 32nd IEEE Conference on Local Computer Networks 2007 IEEE Computer Society 893 900
-
(2007)
Proceedings of the 32nd IEEE Conference on Local Computer Networks
, pp. 893-900
-
-
Boukerche, A.1
Ren, Y.2
Zhang, Z.3
|