-
4
-
-
4944262982
-
Herbivore: A scalable and efficient protocol for anonymous communication
-
S. Goel, M. Robson, M. Polte, and E. Sirer, "Herbivore: A Scalable and Efficient Protocol for Anonymous Communication," Cornell University,2003.
-
(2003)
Cornell University
-
-
Goel, S.1
Robson, M.2
Polte, M.3
Sirer, E.4
-
9
-
-
84943275480
-
Secure dynamic distributed routing algorithm for ad hoc wireless networks
-
K. Il-Khatib, L. Korba, R. Song, and G. Yee, "Secure Dynamic Distributed Routing Algorithm for Ad hoc Wireless Networks," in International Conference on Parallel Processing Workshops (ICPPW), pp.359-366,2003.
-
(2003)
International Conference on Parallel Processing Workshops (ICPPW)
, pp. 359-366
-
-
Il-Khatib, K.1
Korba, L.2
Song, R.3
Yee, G.4
-
10
-
-
0242696170
-
Anodr: Anonymous on demand routing with untraceable routes for mobile adhoc networks
-
J. Kong and X. Hong, "ANODR: ANonymous On Demand Routing with Untraceable Routes for Mobile Adhoc Networks," in4th ACM International Symposium on Mobile Ad-hoc Networking & Computing (MobiHoc), Annapolis MD, USA, pp.291-302,2003.
-
(2003)
4th ACM International Symposium on Mobile Ad-hoc Networking & Computing (MobiHoc), Annapolis MD, USA
, pp. 291-302
-
-
Kong, J.1
Hong, X.2
-
11
-
-
33748622050
-
MASK: Anonymous on-demand routing in mobile Ad Hoc networks
-
DOI 10.1109/TWC.2006.1687761, 1687761
-
Z. Zhang, W. Liu, and Y. Fang, "MASK: Anonymous On-Demand Routing in Mobile Ad Hoc Networks," IEEE Trans. Wireless Commun., vol. 5, pp.2376-2385, Sept.2006. (Pubitemid 44376150)
-
(2006)
IEEE Transactions on Wireless Communications
, vol.5
, Issue.9
, pp. 2376-2385
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
12
-
-
44349104119
-
Protocols for authenticated anonymous communications
-
Athens, Greece
-
H. Fathi, S. Shin, K. Kobara, and H. Imai, "Protocols for Authenticated Anonymous Communications," in18th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). Athens, Greece: IEEE,2007.
-
(2007)
IEEE18th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)
-
-
Fathi, H.1
Shin, S.2
Kobara, K.3
Imai, H.4
-
13
-
-
0029451888
-
Untraceability in mobile networks
-
D. Samfat, R. Molva, and N. Asokan, "Untraceability in Mobile Networks," ACM MOBICOM, pp.26-36,1995.
-
(1995)
ACM MOBICOM
, pp. 26-36
-
-
Samfat, D.1
Molva, R.2
Asokan, N.3
-
14
-
-
17144430885
-
Security analysis and enhancements of 3GPP authentication and key agreement protocol
-
DOI 10.1109/TWC.2004.842941
-
M. Zhang and Y. Fang, "Security Analysis and Enhancements of3GPP Authentication and Key Agreement Protocol," IEEE Trans. Wireless Commun., vol.4, pp.734-742,2005. (Pubitemid 40519754)
-
(2005)
IEEE Transactions on Wireless Communications
, vol.4
, Issue.2
, pp. 734-742
-
-
Zhang, M.1
Fang, Y.2
-
16
-
-
0033296116
-
Untraceable mobility or how to travel incognito
-
G. Ateniese, A. Herzberg, H. Krawczyk, and G. Tsudik, "Untraceable Mobility or How to Travel Incognito," Computer Networks, vol.31, pp.871-884,1999.
-
(1999)
Computer Networks
, vol.31
, pp. 871-884
-
-
Ateniese, G.1
Herzberg, A.2
Krawczyk, H.3
Tsudik, G.4
-
17
-
-
35449005656
-
Anonymous and authenticated key exchange for roaming networks
-
DOI 10.1109/TWC.2007.06020042
-
Y. G., D. Wong, and X. Deng, "Anonymous and Authenticated Key Exchange for Roaming Networks," IEEE Trans. Wireless Commun., vol.6, pp.3461-3472,2007. (Pubitemid 47625225)
-
(2007)
IEEE Transactions on Wireless Communications
, vol.6
, Issue.9
, pp. 3461-3472
-
-
Yang, G.1
Wong, D.S.2
Deng, X.3
-
18
-
-
42549171566
-
SAS: A simple anonymity scheme for clustered wireless sensor networks
-
DOI 10.1109/ICC.2006.255600, 4025001, 2006 IEEE International Conference on Communications, ICC 2006
-
S. Misra and G. Xue, "SAS: A Simple Anonymity Scheme for Clustered Wireless Sensor Networks," in IEEE International Conference on Communications (ICC), pp.3414-3419,2006. (Pubitemid 351576002)
-
(2006)
IEEE International Conference on Communications
, vol.8
, pp. 3414-3419
-
-
Misra, S.1
Guoliang, X.2
-
19
-
-
33847168167
-
A design of overlay anonymous multicast protocol
-
L. Xiao, X. Liu, G. W., D. Xuan, and Y. Liu, "A Design of Overlay Anonymous Multicast Protocol," in Parallel and Distributed Processing Symposium (IPDPS),2006.
-
(2006)
Parallel and Distributed Processing Symposium (IPDPS)
-
-
Xiao, L.1
Liu, X.2
Xuan, D.3
Liu, Y.4
-
20
-
-
47849113709
-
-
Dalian, China
-
J. Wang,C. Niu, and R. Chen, "Bus-based Anonymous Multicast in Peer-to-Peer Overlay, International Conference on Network and Parallel Computing-Workshops, Dalian, China,2007.
-
(2007)
Bus-based Anonymous Multicast in Peer-to-Peer Overlay, International Conference on Network and Parallel Computing-Workshops
-
-
Wang, J.1
Niu, C.2
Chen, R.3
-
22
-
-
0035215230
-
Evaluation of anonymity providing techniques using queuing theory
-
D. Kesdogan, "Evaluation of anonymity providing techniques using queuing theory," in26th Annual IEEE Conference on Local Computer Networks (LCN) Tampa FL, USA, pp.316-322,2001. (Pubitemid 33148879)
-
(2001)
Conference on Local Computer Networks
, pp. 316-322
-
-
Kesdogan, D.1
-
23
-
-
0036372781
-
An optimal strategy for anonymous communication protocols
-
Y. Guan, X. Fu, R. Bettati, and W. Zhao, "An Optimal Strategy for Anonymous Communication Protocols," in22nd International Conference on Distributed Computing Systems, College Station, TX, pp.257-266,2002. (Pubitemid 34980672)
-
(2002)
Proceedings - International Conference on Distributed Computing Systems
, pp. 257-266
-
-
Guan, Y.1
Fu, X.2
Bettati, R.3
Zhao, W.4
-
24
-
-
84860886799
-
Performance evaluation of anonymous routing protocols in manets
-
J. Liu, J. Kong, X. Hong, and M. Gerla, "Performance Evaluation of Anonymous Routing Protocols in MANETs," University of Alabama, p.6,2005.
-
(2005)
University of Alabama
, pp. 6
-
-
Liu, J.1
Kong, J.2
Hong, X.3
Gerla, M.4
-
25
-
-
70449511704
-
-
Springer US
-
J. Kong, J. Liu, X. Hong, D. Wu, and M. Gerla, On Performance Cost of On-demand Anonymous Routing Protocols in Mobile Ad Hoc Networks Springer US,2007.
-
(2007)
On Performance Cost of On-demand Anonymous Routing Protocols in Mobile Ad Hoc Networks
-
-
Kong, J.1
Liu, J.2
Hong, X.3
Wu, D.4
Gerla, M.5
-
26
-
-
0027075569
-
Conceptual framework of anonymity in group support systems
-
J. S. Valacich, A. R. Dennis, L. M. Jessup, and J. F. Nunamaker, Jr., "A Conceptual Framework of Anonymity in Group Support Systems," in25th Hawaii International Conference on System Sciences Kauai HI, USA, pp.101-112 vol.4,1992. (Pubitemid 23571457)
-
(1992)
Proceedings of the Hawaii International Conference on System Science
, vol.4
, pp. 101-112
-
-
Valacich Joseph, S.1
Dennis Alan, R.2
Jessup Leonard, M.3
Nunamaker Jr., J.F.4
-
27
-
-
6944256197
-
Towards a framework for collaborative peer groups
-
V. Sunderam, J. Pascoe, and R. Loader, "Towards a Framework for Collaborative Peer Groups," in3rd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid), pp.428-433,2003.
-
(2003)
3rd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid)
, pp. 428-433
-
-
Sunderam, V.1
Pascoe, J.2
Loader, R.3
-
28
-
-
40249087829
-
Towards a framework for connection anonymity
-
H. Tillwick and M. Olivier, "Towards a Framework for Connection Anonymity," in SAICSIT, pp.113-122,2005.
-
(2005)
SAICSIT
, pp. 113-122
-
-
Tillwick, H.1
Olivier, M.2
-
30
-
-
51849113964
-
Protecting location privacy with personalized k-anonymity: Architecture and algorithms
-
B. Gedik and L. Liu, "Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms," IEEE Trans. Mobile Computing, vol.6,2007.
-
(2007)
IEEE Trans. Mobile Computing
, vol.6
-
-
Gedik, B.1
Liu, L.2
-
32
-
-
70449514631
-
Anonymous communication on the internet
-
A. Jones, "Anonymous Communication on the Internet," Indiana Unversity,2004, p.13.
-
(2004)
Indiana Unversity
, pp. 13
-
-
Jones, A.1
-
34
-
-
33947418087
-
A survey on mix networks and their secure applications
-
K. Sampigethaya and R. Poovendran, "A Survey on Mix Networks and Their Secure Applications," IEEE, vol.94, pp.2142-2181,2006.
-
(2006)
IEEE
, vol.94
, pp. 2142-2181
-
-
Sampigethaya, K.1
Poovendran, R.2
-
35
-
-
35148846345
-
A hierarchical anonymous routing scheme for mobile ad-hoc networks
-
J. Liu, X. Hong, J. Kong, Q. Zheng, N. Hu, and P. Bradford, "A Hierarchical Anonymous Routing Scheme for Mobile Ad-Hoc Networks," in Military Communications Conference (MILCOM), pp.1-7,2006.
-
(2006)
Military Communications Conference (MILCOM)
, pp. 17
-
-
Liu, J.1
Hong, X.2
Kong, J.3
Zheng, Q.4
Hu, N.5
Bradford, P.6
-
36
-
-
12344261863
-
WonGoo: A peer-to-peer protocol for anonymous communication
-
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA'04
-
T. Lu, B. Fang, Y. Sun, and X. Cheng, "WonGoo: A Peer-to-Peer Protocol for Anonymous Communication," Journal of Parallel and Distributed Processing Techniques and Applications, vol.3, pp.1102-1106,2004. (Pubitemid 40118875)
-
(2004)
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA'04
, vol.3
, pp. 1102-1106
-
-
Lu, T.1
Fang, B.2
Sun, Y.3
Cheng, X.4
-
37
-
-
33745945444
-
AnonDSR: Efficient anonymous dynamic source routing for mobile ad-hoc networks
-
DOI 10.1145/1102219.1102226, SASN'05 - Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks
-
R. Song, L. Korba, and G. Yee, "AnonDSR: Efficient Anonymous Dynamic Source Routing for Mobile Ad-hoc Networks," in3rd ACM Workshop on Security of Ad hoc and Sensor Networks Alexandria VA, USA, pp.33-42,2005. (Pubitemid 44059928)
-
(2005)
SASN'05 - Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks
, vol.2005
, pp. 33-42
-
-
Song, R.1
Korba, L.2
Yee, G.3
-
38
-
-
20544471574
-
SDAR: A Secure Distributed Anonymous Routing protocol for wireless and mobile ad hoc networks
-
Proceedings - 29th Annual IEEE International Conference on Local Computer Networks, LCN 2004
-
A. Boukerche, K. El-Khatib, L. Xu, and L. Korba, "SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks," in29th Annual IEEE International Conference on Local Computer Networks, pp.618-624,2004. (Pubitemid 40845289)
-
(2004)
Proceedings - Conference on Local Computer Networks, LCN
, pp. 618-624
-
-
Boukerche, A.1
El-Khatib, K.2
Xu, L.3
Korba, L.4
-
39
-
-
84937564790
-
Anonymity, unobservability, and pseudonymity-A proposal for terminology
-
Berkeley, CA, USA
-
A. Pfitzmann and M. Kohntopp, "Anonymity, Unobservability, and Pseudonymity-A Proposal for Terminology," in Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, p.1-9,2000.
-
(2000)
Workshop on Design Issues in Anonymity and Unobservability
, pp. 19
-
-
Pfitzmann, A.1
Kohntopp, M.2
-
40
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
January
-
D. L. Chaum, "The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability," Journal of Cryptology, vol.1, pp.65-75, January,1988.
-
(1988)
Journal of Cryptology
, vol.1
, pp. 65-75
-
-
Chaum, D.L.1
-
41
-
-
84937555451
-
Networks without user observability-design options
-
Linz, Austria
-
A. Pfitzmann and M. Waidner, "Networks without User Observability-Design Options," in Workshop on the Theory and Application of Cryptographic Techniques, Linz, Austria, pp.245-253,1986.
-
(1986)
Workshop on the Theory and Application of Cryptographic Techniques
, pp. 245-253
-
-
Pfitzmann, A.1
Waidner, M.2
-
42
-
-
84896508047
-
Unconditional sender and recipient untraceability in spite of active attacks
-
M. Waidner, "Unconditional Sender and Recipient Untraceability in Spite of Active Attacks," in Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology, Houthalen, Belgium, pp.302-319,1990.
-
(1990)
Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology, Houthalen, Belgium
, pp. 302-319
-
-
Waidner, M.1
-
44
-
-
20544465052
-
Anonymous secure routing in mobile ad-hoc networks
-
Proceedings - 29th Annual IEEE International Conference on Local Computer Networks, LCN 2004
-
B. Zhu, Z. Wna, M. S. Kankanhalli, F. Bao, and R. H. Deng, "Anonymous Secure Routing in Mobile Ad-Hoc Networks,"29th Annual IEEE International Conference on Local Computer Networks pp.102-108,2004. (Pubitemid 40845199)
-
(2004)
Proceedings - Conference on Local Computer Networks, LCN
, pp. 102-108
-
-
Zhu, B.1
Wan, Z.2
Kankanhalli, M.S.3
Bao, F.4
Deng, R.H.5
-
45
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
San Francisco, CA
-
M. Gruteser and D. Grunwald, "Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking," in Proc. MobiSys2003: The1st International Conference on Mobile Systems, Applications, and Services, San Francisco, CA, pp.31-42,2003.
-
(2003)
Proc. MobiSys2003: The1st International Conference on Mobile Systems, Applications, and Services
, pp. 31-42
-
-
Gruteser, M.1
Grunwald, D.2
-
46
-
-
84860885423
-
Prive: Anonymous location-based queries in distributed mobile systems
-
National University of Singapore, Singapore
-
G. Ghinita, P. Kalnis, and S. Skiadopoulos, "PRIVE: Anonymous Location-Based Queries in Distributed Mobile Systems," Department of Computer Science, National University of Singapore, Singapore,2006.
-
(2006)
Department of Computer Science
-
-
Ghinita, G.1
Kalnis, P.2
Skiadopoulos, S.3
-
48
-
-
63749090408
-
Odar: On-demand anonymous routing in ad hoc networks
-
University of California
-
D. Sy, R. Chen, and L. Bao, "ODAR: On-Demand Anonymous Routing in Ad Hoc Networks," University of California, Irvine, pp.1-10,2006.
-
(2006)
Irvine
, pp. 1-10
-
-
Sy, D.1
Chen, R.2
Bao, L.3
-
49
-
-
22944492132
-
AO2P: Ad hoc on-demand position-based private routing protocol
-
DOI 10.1109/TMC.2005.50
-
X. Wu and B. Bhargava, "AO2P: Ad Hoc On-Demand Position-Based Private Routing Protocol," IEEE Trans. Mobile Computing, vol.4, pp.335-348,2005. (Pubitemid 41049891)
-
(2005)
IEEE Transactions on Mobile Computing
, vol.4
, Issue.4
, pp. 335-348
-
-
Wu, X.1
Bhargava, B.2
-
50
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
February
-
D. L. Chaum, "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms," Communications of the ACM, vol.24, pp.84-88, February1981.
-
(1981)
Communications of the ACM
, vol.24
, pp. 84-88
-
-
Chaum, D.L.1
-
51
-
-
34250785454
-
On flow correlation attacks and countermeasures in mix networks
-
Canada
-
Y. Zhu, X. Fu, B. Graham, R. Bettati, and W. Zhao, "On Flow Correlation Attacks and Countermeasures in Mix Networks," in Workshop of Privacy Enchaning Technologies (PET) Toronto, Canada,2004.
-
(2004)
Workshop of Privacy Enchaning Technologies (PET) Toronto
-
-
Zhu, Y.1
Fu, X.2
Graham, B.3
Bettati, R.4
Zhao, W.5
-
52
-
-
85180737609
-
An analysis of the degradation of anonymous protocols
-
M. Wright, M. Adler, B. Levine, and C. Shields, "An Analysis of the Degradation of Anonymous Protocols," in Network and Distributed Security Symposium (NDSS),2002.
-
(2002)
Network and Distributed Security Symposium (NDSS)
-
-
Wright, M.1
Adler, M.2
Levine, B.3
Shields, C.4
-
55
-
-
20344398437
-
Security limitations of an authorized anonymous ID-based scheme for mobile communication
-
DOI 10.1109/MCOM.2005.1453437
-
R. Phan, "Security limitations of an authorized anonymous ID-based scheme for mobile communication," in Communications Mag.. vol.43, pp.149-153,2005. (Pubitemid 40784480)
-
(2005)
IEEE Communications Magazine
, vol.43
, Issue.5
, pp. 149-153
-
-
Phan, R.C.-W.1
-
56
-
-
51249098943
-
A new replay attack against anonymous communication networks
-
R. Pries, W. Yu, X. Fu, and W. Zhao, "A New Replay Attack Against Anonymous Communication Networks," in IEEE International Conference on Communications (ICC), Beijing, China, pp.1578-1582,2008.
-
(2008)
IEEE International Conference on Communications (ICC), Beijing, China
, pp. 1578-1582
-
-
Pries, R.1
Yu, W.2
Fu, X.3
Zhao, W.4
-
57
-
-
0036312325
-
Hordes: A multicast-based protocol for anonymity
-
B. Levine and C. Shields, "Hordes: A Multicast-based Protocol for Anonymity," Journal of Computer Security, vol.10, pp.213-240,2002
-
(2002)
Journal of Computer Security
, vol.10
, pp. 213-240
-
-
Levine, B.1
Shields, C.2
-
58
-
-
84873857575
-
Cashmere: Resilient anonymous routing
-
L. Zhuang, F. Zhou, B. Zhao, and A. Rowstron, "Cashmere: Resilient Anonymous Routing," in2nd Symposium on Networked Systems Design & Implementation (NSDI), Boston MA, pp.301-314,2005.
-
(2005)
2nd Symposium on Networked Systems Design & Implementation (NSDI), Boston MA
, pp. 301-314
-
-
Zhuang, L.1
Zhou, F.2
Zhao, B.3
Rowstron, A.4
-
59
-
-
33744551700
-
Achieving K-anonymity in mobile ad hoc networks
-
DOI 10.1109/NPSEC.2005.1532051, 1532051, 2005 First Workshop on Secure Network Protocols, NPSec, held in conjunction with ICNP 2005: 13th IEEE International Conference on Network Protocols
-
X. Wu and E. Bertino, "Achieving K-anonymity in Mobile Ad Hoc Networks," in1st IEEE ICNP Workshop on Secure Network Protocols (NPSec), pp.37-42,2005. (Pubitemid 44461873)
-
(2005)
2005 First Workshop on Secure Network Protocols, NPSec, held in conjunction with ICNP 2005: 13th IEEE International Conference on Network Protocols
, vol.2005
, pp. 37-42
-
-
Wu, X.1
Bertino, E.2
-
62
-
-
85116486060
-
Location-aided routing (lar) in mobile ad hoc networks
-
Dallas, USA
-
Y. Ko and N. Vaidva, "Location-Aided Routing (LAR) in Mobile Ad Hoc Networks," in4th International Conference on Mobile Computing and Networking, Dallas, USA,. pp.66-75,1998.
-
(1998)
4th International Conference on Mobile Computing and Networking
, pp. 66-75
-
-
Ko, Y.1
Vaidva, N.2
-
63
-
-
84860886917
-
Scalable anonymous connections in the context of mip and aaa
-
H. Hartenstein, K. Jonas, M. Liebsch, M. Stiemerling, R. Schmitz, and D. Westhoff, "Scalable Anonymous Connections in the Context of MIP and AAA," in10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp.217-222,2001.
-
(2001)
10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
, pp. 217-222
-
-
Hartenstein, H.1
Jonas, K.2
Liebsch, M.3
Stiemerling, M.4
Schmitz, R.5
Westhoff, D.6
-
64
-
-
2542616812
-
Quest for personal control over mobile location privacy
-
Q. He, D. Wu, and P. Khosla, "Quest for Personal Control over Mobile Location Privacy," in IEEE Commun. Mag.. vol.45, pp.130-136,2004.
-
(2004)
IEEE Commun. Mag..
, vol.45
, pp. 130-136
-
-
He, Q.1
Wu, D.2
Khosla, P.3
-
65
-
-
50249092669
-
Subscriptionless mobile networking: Anonymity and privacy aspects within personal area networks
-
M. Schmidt, "Subscriptionless Mobile Networking: Anonymity and Privacy Aspects within Personal Area Networks," in IEEE in Wireless Communications and Networking Conference (WCNC), pp.869-875,2002.
-
(2002)
IEEE in Wireless Communications and Networking Conference (WCNC)
, pp. 869-875
-
-
Schmidt, M.1
-
66
-
-
34347244961
-
An identity-free and on-demand routing scheme against anonymity threats in mobile ad hoc networks
-
DOI 10.1109/TMC.2007.1021
-
J. Kong, X. Hong, and M. Gerla, "An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks," IEEE Trans. Mobile Computing, vol.6, pp.888-902,2007. (Pubitemid 46993988)
-
(2007)
IEEE Transactions on Mobile Computing
, vol.6
, Issue.8
, pp. 888-902
-
-
Kong, J.1
Hong, X.2
Gerla, M.3
-
67
-
-
25844443821
-
Anonymous communications in mobile ad hoc networks
-
Z. Yanchao, L. Wei, and L. Wenjing, "Anonymous Communications in Mobile Ad Hoc Networks," in24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), pp.1940-1951 vol.3,2005.
-
(2005)
24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM)
, vol.3
, pp. 1940-1951
-
-
Yanchao, Z.1
Wei, L.2
Wenjing, L.3
-
69
-
-
33751073206
-
ARM: Anonymous routing protocol for mobile ad hoc networks
-
DOI 10.1109/AINA.2006.104, 1620366, Proceedings - 20th International Conference on Advanced Information Networking and Applications
-
S. Seys and B. Preneel, "ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks," in20th International Conference on Advanced Information Networking and Applications (AINA), Vienna, AU, pp.133-137,2006. (Pubitemid 44761314)
-
(2006)
Proceedings - International Conference on Advanced Information Networking and Applications, AINA
, vol.2
, pp. 133-137
-
-
Seys, S.1
Preneel, B.2
-
70
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable erros
-
July
-
B. H. Bloom, "Space/time Trade-offs in Hash Coding with Allowable Erros," Communications of the ACM, vol.13, pp.422-426, July1970.
-
(1970)
Communications of the ACM
, vol.13
, pp. 422-426
-
-
Bloom, B.H.1
-
71
-
-
84860882966
-
A new approach to anonymous multicast routing in ad hoc networks
-
L. Bao, "A New Approach to Anonymous Multicast Routing in Ad Hoc Networks," in CHINACOM,2007.
-
(2007)
CHINACOM
-
-
Bao, L.1
-
72
-
-
38549121414
-
ASRPAKE: An anonymous secure routing protocol with authenticated key exchange for wireless ad hoc networks
-
DOI 10.1109/ICC.2007.211, 4288882, 2007 IEEE International Conference on Communications, ICC'07
-
X. Lin, R. Lu, H. Zhu, P. Ho, and Z. Cao, "ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks," in IEEE International Conference on Communications (ICC), Glasgow, pp.1247-1253,2007. (Pubitemid 351145708)
-
(2007)
IEEE International Conference on Communications
, pp. 1247-1253
-
-
Lin, X.1
Lu, R.2
Zhu, H.3
Ho, P.-H.4
Shen, X.5
Cao, Z.6
-
73
-
-
33749404767
-
An anonymous on-demand position-based routing in mobile ad hoc networks
-
M. Rahman, M. Mambo, A. Inomata, and E. Okamoto, "An Anonymous On-Demand Position-Based Routing in Mobile Ad Hoc Networks," in International Symposium on Applications and the Internet (SAINT), p.7,2006.
-
(2006)
International Symposium on Applications and the Internet (SAINT)
, pp. 7
-
-
Rahman, M.1
Mambo, M.2
Inomata, A.3
Okamoto, E.4
-
76
-
-
22944492132
-
AO2P: Ad hoc on-demand position-based private routing protocol
-
DOI 10.1109/TMC.2005.50
-
X. Wu and B. Bhargava, "AO2P: Ad hoc On-demand Position-based Private Routing Protocol," in IEEE Trans. Mobile Computing. vol.4, pp.335-348,2005. (Pubitemid 41049891)
-
(2005)
IEEE Transactions on Mobile Computing
, vol.4
, Issue.4
, pp. 335-348
-
-
Wu, X.1
Bhargava, B.2
-
77
-
-
4544285741
-
Distributed clustering in ad hoc sensor networks: A hybrid, energy-efficient approach
-
O. Younis and S. Fahmy, "Distributed Clustering in Ad Hoc Sensor Networks: A Hybrid, Energy-Efficient Approach," in INFOCOM, pp.629-640,2004.
-
(2004)
INFOCOM
, pp. 629-640
-
-
Younis, O.1
Fahmy, S.2
-
78
-
-
70449512517
-
Anonymous surfing with java anonymous proxy
-
T. Eggendorfer, "Anonymous Surfing with Java Anonymous Proxy," in Linux Magazine, pp.44-46,2005.
-
(2005)
Linux Magazine
, pp. 44-46
-
-
Eggendorfer, T.1
-
79
-
-
0032074579
-
Anonymous connections and onion routing
-
M. G. Reed, P. F. Syverson, and D. M. Goldschlag, "Anonymous Connections and Onion Routing," IEEE J. Sel. Areas Commun., vol.16,1998.
-
(1998)
IEEE J. Sel. Areas Commun.
, vol.16
-
-
Reed, M.G.1
Syverson, P.F.2
Goldschlag, D.M.3
-
81
-
-
70449481699
-
Mixmaster protocol version3
-
L. Cottrell, "Mixmaster Protocol Version3," Anonymizer Inc.,2001.
-
(2001)
Anonymizer Inc.
-
-
Cottrell, L.1
-
83
-
-
17144430885
-
Security analysis and enhancements of 3GPP authentication and key agreement protocol
-
DOI 10.1109/TWC.2004.842941
-
M. Zhang and Y. Fang, "Security Analysis and Enhancements of3GPP Authentication and Key Agreement Protocol," IEEE Trans. Wireless Commun., vol.4, pp.734-742, 04 April2005. (Pubitemid 40519754)
-
(2005)
IEEE Transactions on Wireless Communications
, vol.4
, Issue.2
, pp. 734-742
-
-
Zhang, M.1
Fang, Y.2
-
84
-
-
35449005656
-
Anonymous and authenticated key exchange for roaming networks
-
DOI 10.1109/TWC.2007.06020042
-
Y. G., D. Wong, and X. Deng, "Anonymous and Authenticated Key Exchange for Roaming Networks," IEEE Trans. Wireless Commun., vol.6, pp.3461-3472, September2007. (Pubitemid 47625225)
-
(2007)
IEEE Transactions on Wireless Communications
, vol.6
, Issue.9
, pp. 3461-3472
-
-
Yang, G.1
Wong, D.S.2
Deng, X.3
-
85
-
-
0029451888
-
Untraceability in mobile networks
-
D. Samfat, R. Molva, and N. Asokan, "Untraceability in Mobile Networks," ACM MOBICOM, pp.26-36,1995.
-
(1995)
ACM MOBICOM
, pp. 26-36
-
-
Samfat, D.1
Molva, R.2
Asokan, N.3
-
86
-
-
36949008722
-
Anonymity loves company: Anonymous web transactions with crowds
-
ACM
-
M. Reiter and A. Rubin, "Anonymity loves company: Anonymous Web transactions with Crowds," Communications of the ACM, vol.42,1999.
-
(1999)
Communications of the
, vol.42
-
-
Reiter, M.1
Rubin, A.2
-
87
-
-
24344501784
-
Measuring anonymity in a non-adaptive, real-time system
-
G. Toth and Z. Hornak, "Measuring Anonymity in a Non-adaptive, Real-time System," Privacy Enhancing Technologies workshop (PET), vol.3424, pp.226-241,2004.
-
(2004)
Privacy Enhancing Technologies workshop (PET)
, vol.3424
, pp. 226-241
-
-
Toth, G.1
Hornak, Z.2
-
89
-
-
33746634961
-
Information theory and anonymity
-
C. Diaz, J. Claessens, S. Seys, and B. Preneel, "Information Theory and Anonymity," in23rd Symposium on Information Theory in the Benelux, Louvain la Neuve, Belgium, pp.179-186,2002.
-
(2002)
23rd Symposium on Information Theory in the Benelux, Louvain la Neuve, Belgium
, pp. 179-186
-
-
Diaz, C.1
Claessens, J.2
Seys, S.3
Preneel, B.4
-
90
-
-
34748911762
-
A combinatorial approach to measuring anonymity
-
M. Edman, F. Sivrikaya, and B. Yener, "A Combinatorial Approach to Measuring Anonymity," in IEEE Intelligence and Security Informatics, pp.356-363,2007.
-
(2007)
IEEE Intelligence and Security Informatics
, pp. 356-363
-
-
Edman, M.1
Sivrikaya, F.2
Yener, B.3
-
91
-
-
33744551700
-
Achieving K-anonymity in mobile ad hoc networks
-
DOI 10.1109/NPSEC.2005.1532051, 1532051, 2005 First Workshop on Secure Network Protocols, NPSec, held in conjunction with ICNP 2005: 13th IEEE International Conference on Network Protocols
-
W. Xiaoxin and E. Bertino, "Achieving K-anonymity in Mobile Ad Hoc Networks," in1st IEEE ICNP Workshop on Secure Network Protocols (NPSec'05), pp.37-42,2005. (Pubitemid 44461873)
-
(2005)
2005 First Workshop on Secure Network Protocols, NPSec, held in conjunction with ICNP 2005: 13th IEEE International Conference on Network Protocols
, vol.2005
, pp. 37-42
-
-
Wu, X.1
Bertino, E.2
-
92
-
-
46149110091
-
On measuring anonymity for wireless mobile ad-hoc networks
-
H. Dijiang, "On Measuring Anonymity For Wireless Mobile Ad-hoc Networks," in31st IEEE Local Computer Networks Conference, pp.779-786,2006.
-
(2006)
31st IEEE Local Computer Networks Conference
, pp. 779-786
-
-
Dijiang, H.1
-
93
-
-
34748903533
-
A k-anonymous communication protocol for overlay networks
-
Singapore
-
P. Wang, P. Ning, and D. Reeves and E. Bertino, "A k-Anonymous Communication Protocol for Overlay Networks," Proceedings of the ASIACCS, Singapore,2007.
-
(2007)
Proceedings of the ASIACCS
-
-
Wang, P.1
Ning, P.2
Reeves, D.3
Bertino, E.4
-
95
-
-
77951462266
-
Ap3: Cooperative, decentralized anonymous communication
-
A. Mislove, G. Oberoi, A. Post, C. Reis, P. Druschel, and D. Wallach, "AP3: Cooperative, Decentralized Anonymous Communication," in11th ACM SIGOPS European Workshop, Leuven, Belgium,2004
-
(2004)
11th ACM SIGOPS European Workshop, Leuven, Belgium
-
-
Mislove, A.1
Oberoi, G.2
Post, A.3
Reis, C.4
Druschel, P.5
Wallach, D.6
-
96
-
-
62849093676
-
Towards mathematically modeling the anonymity reasoning ability of an adversary
-
Austin TX, USA
-
D. Kelly, R. Raines, R. Baldwin, B. Mullins, and M. Grimaila, "Towards Mathematically Modeling the Anonymity Reasoning Ability of an Adversary," presented at IPCCC International Workshop on Information and Data Assurance, Austin TX, USA,2008.
-
(2008)
Presented at IPCCC International Workshop on Information and Data Assurance
-
-
Kelly, D.1
Raines, R.2
Baldwin, R.3
Mullins, B.4
Grimaila, M.5
-
97
-
-
70449516146
-
A survey of the state of the art in anonymity metrics
-
D. Kelly, R. Raines, R. Baldwin, B. Mullins, and M. Grimaila, "A Survey of the State of the Art in Anonymity Metrics," in1st Workshop on Network Data Anonymization (NDA2008): ACM,2008.
-
1st Workshop on Network Data Anonymization (NDA2008): ACM
, vol.2008
-
-
Kelly, D.1
Raines, R.2
Baldwin, R.3
Mullins, B.4
Grimaila, M.5
-
98
-
-
33750938846
-
Towards a security architecture for vehicular ad hoc networks
-
K. Plobl, T. Nowey, and C. Mletzko, "Towards a Security Architecture for Vehicular Ad Hoc Networks," presented at First International Conference on Availability, Reliability and Security (ARES),2006.
-
(2006)
Presented at First International Conference on Availability, Reliability and Security (ARES)
-
-
Plobl, K.1
Nowey, T.2
Mletzko, C.3
-
99
-
-
77249166657
-
Anonymous user communication for privacy protection in wireless metropolitan mesh network
-
Z. Wan, K.. Ren, B. Zhu, B. Preneel, and M.. Gu, "Anonymous User Communication for Privacy Protection in Wireless Metropolitan Mesh Network," IEEE Trans. Vehicular Technology, Vol. 59, Issue2, pp. 519-532,2010.
-
(2010)
IEEE Trans. Vehicular Technology
, vol.59
, Issue.2
, pp. 519-532
-
-
Wan, Z.1
Ren, K.2
Zhu, B.3
Preneel, B.4
M. Gu5
-
101
-
-
77954790055
-
Analysis of anonymity in p2p anonymous communication systems
-
J. Zhang, H. Duan, W. Liu, and J. Wu, "Analysis of Anonymity in P2P Anonymous Communication Systems," IEEE24th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp.860-865,2010.
-
(2010)
IEEE24th International Conference on Advanced Information Networking and Applications Workshops (WAINA)
, pp. 860-865
-
-
Zhang, J.1
Duan, H.2
Liu, W.3
Wu, J.4
-
102
-
-
76949104041
-
Efficient id-based registration protocol featured with user anonymity in mobile ip networks
-
L. Dang, W. Kou, H. Li, J.. Zhang, X. Cao, B. Zhao, and K. Fan, "Efficient ID-based Registration Protocol Featured with User Anonymity in Mobile IP Networks," IEEE Trans. Wireless Commun., Vol.9, Issue2, pp. 594-604,2010.
-
(2010)
IEEE Trans. Wireless Commun.
, vol.9
, Issue.2
, pp. 594-604
-
-
Dang, L.1
Kou, W.2
Li, H.3
Zhang, J.4
Cao, X.5
Zhao, B.6
Fan, K.7
-
103
-
-
78249248690
-
Bi-directional rprob-based location anonymizer system for location-based services
-
T. Minh-Triet. L. Vi-Minh, D. Anh-Duc, and I. Echizen, "Bi-directional RPROB-based Location Anonymizer System for Location-Based Services," IEEE10th International Conference on Computer and Information Technology (CIT), pp.971-977,2010.
-
(2010)
IEEE10th International Conference on Computer and Information Technology (CIT)
, pp. 971-977
-
-
Minh-Triet, T.1
Vi-Minh, L.2
Anh-Duc, D.3
Echizen, I.4
-
104
-
-
77956581946
-
A light-weighted extension of anonymous communications in ipv6 network
-
Z. Jia, D. Haixin, L. Wu, and W. Jianping, "A light-weighted extension of anonymous communications in IPv6 Network," International Conference on Green Circuits and Systems (ICGCS), pp.404-408,2010.
-
(2010)
International Conference on Green Circuits and Systems (ICGCS)
, pp. 404-408
-
-
Jia, Z.1
Haixin, D.2
Wu, L.3
Jianping, W.4
-
106
-
-
44049096615
-
Secure anonymous group infrastructure for common and future internet applications
-
N. Weiler, "Secure Anonymous Group Infrastructure for Common and Future Internet Applications," in Computer Security Applications Conference,2001.
-
(2001)
Computer Security Applications Conference
-
-
Weiler, N.1
-
107
-
-
51249094082
-
A new anonymity measure based on partial entropy
-
G. Duan, W.Wang, J. Wang, and L. Yang, "A New Anonymity Measure Based on Partial Entropy," Proceedings of IEEE International Conference on Communications, pp.1484-1488,2008.
-
(2008)
Proceedings of IEEE International Conference on Communications
, pp. 1484-1488
-
-
Duan, G.1
Wang, W.2
Wang, J.3
Yang, L.4
-
108
-
-
1942500486
-
A quantitative analysis of anonymous communications
-
Y. Guan, X. Fu, R. Bettai, and W. Zhao, "A Quantitative Analysis of Anonymous Communications," IEEE Trans. Reliability, Vol. 53, pp.103-115,2004.
-
(2004)
IEEE Trans. Reliability
, vol.53
, pp. 103-115
-
-
Guan, Y.1
Fu, X.2
Bettai, R.3
Zhao, W.4
-
109
-
-
51349100827
-
A security architecture achieving anonymity and traceability in wireless mesh networks
-
J. Sun, C. Zhang, Y.Fang, "A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks," Proc.27th IEEE Conference on Computer Communications (INFOCOM), pp.1687-1695,2008.
-
(2008)
Proc.27th IEEE Conference on Computer Communications (INFOCOM)
, pp. 1687-1695
-
-
Sun, J.1
Zhang, C.2
Fang, Y.3
-
113
-
-
33744479345
-
Freenet: A distributed anonymous information storage and retrieval system
-
I. Clarke, O. Sandberg, B. Wiley, and T.W. Hong, "Freenet: A Distributed Anonymous Information Storage and Retrieval System," Proc. International Workshop on Design Issues in Anonymity and Unobservability, pp.44-66,2001.
-
(2001)
Proc. International Workshop on Design Issues in Anonymity and Unobservability
, pp. 44-66
-
-
Clarke, I.1
Sandberg, O.2
Wiley, B.3
Hong, T.W.4
-
115
-
-
84950292630
-
Architecture for an anonymity network
-
M. Rennhard, S. Rafaeli, and L. Mathy, Eds, "Architecture for an Anonymity Network," Proc.10th IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp.165-170,2001.
-
(2001)
Proc.10th IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
, pp. 165-170
-
-
Rennhard, M.1
Rafaeli, S.2
Mathy Eds, L.3
-
116
-
-
45749109010
-
Sybilguard: Defending against sybil attacks via social networks
-
H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman, "SybilGuard: Defending against Sybil Attacks via Social Networks," IEEE/ACM Trans. Netw., Vol.16, Issue3, pp. 576-589,2008.
-
(2008)
IEEE/ACM Trans. Netw.
, vol.16
, Issue.3
, pp. 576-589
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
-
117
-
-
84860885418
-
Responder anonymity and anonymous peer-to-peer file sharing
-
V. Scarlata, N. Levine, and C. Shields, "Responder Anonymity and Anonymous Peer-to-Peer File Sharing," in Proc. IEEE INCP,2001.
-
(2001)
Proc. IEEE INCP
-
-
Scarlata, V.1
Levine, N.2
Shields, C.3
-
120
-
-
3242815149
-
Towards measuring anonymity
-
C. Diaz, S. Seys, J. Claessens, and B. Preneel, "Towards Measuring Anonymity," Proceedings of Privacy Enhancing Technologies (PET),2002.
-
(2002)
Proceedings of Privacy Enhancing Technologies (PET)
-
-
Diaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
122
-
-
79960704657
-
-
House of Lords European Union Committee 5th Report of Session2009-10
-
House of Lords European Union Committee, "Protecting Europe against Large-scale Cyber-attacks", 5th Report of Session2009-10, http://www.publications.parliament.uk/pa/ld200910/ldselect/ldeucom/68/68.pdf, 2010
-
(2010)
Protecting Europe against Large-scale Cyber-attacks"
-
-
-
123
-
-
80053465803
-
-
The White House Office of the Press Secretary
-
The White House Office of the Press Secretary, "Remarks by the President on Securing Our Nation's Cyber Infrastructure," www.whiteshouse.gov, http://www.whitehouse.gov/the-press-office/remarks- president-securing-our-nations-cyber-infrastructure,2009
-
(2009)
Remarks by the President on Securing Our Nation's Cyber Infrastructure
-
-
-
124
-
-
84860885938
-
-
U.S. Department of Commerce, Office of Public Affairs
-
U.S. Department of Commerce, Office of Public Affairs, "U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Step to Enhance Online Strategy, Planned National Office for Identity Trust Strategy", www.commerce.gov, http://www.commerce.gov/ news/pressreleases/2011/01/07/us-commerce-secretary-gary-locke-white- housecybersecurity-coordinato,2011
-
(2011)
U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Step to Enhance Online Strategy, Planned National Office for Identity Trust Strategy
-
-
-
125
-
-
81055157666
-
Denial of service attacks in wireless networks: The case of jammers
-
K. Pelechrinis, M. Iliofotou, and V. Krishnamurthy, "Denial of Service Attacks in Wireless Networks: The Case of Jammers," IEEE Commun. Surveys Tuts., Vol. PP, Issue99, pp.1-13,2010.
-
(2010)
IEEE Commun. Surveys Tuts.
, Issue.99 PP
, pp. 1-13
-
-
Pelechrinis, K.1
Iliofotou, M.2
Krishnamurthy, V.3
-
126
-
-
72949104155
-
A survey on jamming attacks and countermeasures
-
A. Mpitziopoulos, D. Gavalas, and G. Panziou, "A survey on jamming attacks and countermeasures," IEEE Commun. Surveys Tuts., Vol.11, Issue4, pp.42-56,2009.
-
(2009)
IEEE Commun. Surveys Tuts.
, vol.11
, Issue.4
, pp. 42-56
-
-
Mpitziopoulos, A.1
Gavalas, D.2
Panziou, G.3
-
127
-
-
84856161231
-
A survey of trust management for mobile ad hoc networks
-
J. Cho, A. Swami, and I. Chen, "A Survey of Trust Management for Mobile Ad Hoc Networks, "IEEE Commun. Surveys Tuts., Vol. PP, Issue99, pp.1-22,2010.
-
(2010)
IEEE Commun. Surveys Tuts.
, Issue.99 PP
, pp. 1-22
-
-
Cho, J.1
Swami, A.2
Chen, I.3
-
128
-
-
77955065766
-
Host identity protocol (hip): Connectivity, mobility, multi-homing, security, and privacy over ipv4 and ipv6 networks
-
P. Nikander, A. Gurtov, and T.R. Henderson, "Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6 Networks," IEEE Commun. Surveys Tuts., Vol.12, Issue2, pp.186-204,2010.
-
(2010)
IEEE Commun. Surveys Tuts.
, vol.12
, Issue.2
, pp. 186-204
-
-
Nikander, P.1
Gurtov, A.2
Henderson, T.R.3
-
129
-
-
70349472866
-
A survey on internet traffic identification
-
A. Callado, C. Kamienski, G. Szabo, B. Gero, J. Kelner, S. Fernandes, and D. Sadok "A Survey on Internet Traffic Identification," IEEE Commun. Surveys Tuts., Vol.11, Issue3, pp.37-52,2009.
-
(2009)
IEEE Commun. Surveys Tuts.
, vol.11
, Issue.3
, pp. 37-52
-
-
Callado, A.1
Kamienski, C.2
Szabo, G.3
Gero, B.4
Kelner, J.5
Fernandes, S.6
Sadok, D.7
|