-
2
-
-
77951578596
-
Preserving privacy in location-based mobile social applications
-
ACM
-
Puttaswamy, K.P.N. and B.Y. Zhao, Preserving privacy in location-based mobile social applications, in HotMobile 2010, ACM. p. 1-6.
-
(2010)
HotMobile
, pp. 1-6
-
-
Puttaswamy, K.P.N.1
Zhao, B.Y.2
-
4
-
-
33947176178
-
Opportunistic networking: Data forwarding in disconnected mobile ad hoc networks
-
Pelusi, L., A. Passarella, and M. Conti, Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. Communications Magazine, IEEE, 2006. 44(11): p. 134-141.
-
(2006)
Communications Magazine, IEEE
, vol.44
, Issue.11
, pp. 134-141
-
-
Pelusi, L.1
Passarella, A.2
Conti, M.3
-
5
-
-
84885799779
-
Pocket switched networks and human mobility in conference environments
-
ACM
-
Hui, P., et al., Pocket switched networks and human mobility in conference environments, in SIGCOMM workshop on DTN 2005, ACM.
-
(2005)
SIGCOMM Workshop on DTN
-
-
Hui, P.1
-
6
-
-
77958084079
-
Security and privacy in emerging wireless networks
-
Ma, D. and G. Tsudik, Security and privacy in emerging wireless networks. Wireless Comm., 2010. 17(5): p. 12-21.
-
(2010)
Wireless Comm.
, vol.17
, Issue.5
, pp. 12-21
-
-
Ma, D.1
Tsudik, G.2
-
7
-
-
80052782346
-
The impact of location privacy on opportunistic networks
-
Parris, I. and T. Henderson, The impact of location privacy on opportunistic networks, in WoWMoM2011.
-
WoWMoM2011
-
-
Parris, I.1
Henderson, T.2
-
8
-
-
37849017498
-
Social network analysis for routing in disconnected delay-tolerant manets
-
ACM
-
Daly, E. and M. Haahr. Social network analysis for routing in disconnected delay-tolerant manets. in MobiHoc'07. 2007. ACM.
-
(2007)
MobiHoc'07
-
-
Daly, E.1
Haahr, M.2
-
9
-
-
34547650428
-
How small labels create big improvements
-
IEEE
-
Hui, P. and J. Crowcroft, How Small Labels Create Big Improvements, in PERCOMW '072007, IEEE p. 65-70.
-
PERCOMW '072007
, pp. 65-70
-
-
Hui, P.1
Crowcroft, J.2
-
10
-
-
74349118836
-
Habit: Leveraging human mobility and social network for efficient content dissemination in Delay Tolerant Networks
-
IEEE
-
Mashhadi, A., B. Mokhtar, and L. Capra. Habit: Leveraging human mobility and social network for efficient content dissemination in Delay Tolerant Networks. in WoWMoM. 2009. IEEE.
-
(2009)
WoWMoM
-
-
Mashhadi, A.1
Mokhtar, B.2
Capra, L.3
-
11
-
-
78650896411
-
Moving forward: Location privacy and location awareness
-
ACM: San Jose, California
-
Duckham, M., Moving forward: location privacy and location awareness, in SPRINGL2010, ACM: San Jose, California. p. 1-3.
-
SPRINGL2010
, pp. 1-3
-
-
Duckham, M.1
-
12
-
-
77954016786
-
Privacy-enhanced social network routing in opportunistic networks
-
IEEE
-
Parris, I., G. Bigwood, and T. Henderson. Privacy-enhanced social network routing in opportunistic networks. in PERCOM Workshops. 2010. IEEE.
-
(2010)
PERCOM Workshops
-
-
Parris, I.1
Bigwood, G.2
Henderson, T.3
-
13
-
-
77953313061
-
SPRING: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks
-
IEEE
-
Rongxing, L., L. Xiaodong, and S. Xuemin. SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks. in INFOCOM. 2010. IEEE.
-
(2010)
INFOCOM
-
-
Rongxing, L.1
Xiaodong, L.2
Xuemin, S.3
-
14
-
-
84885059952
-
Privacy-preserving content-based publish/subscribe networks
-
Shikfa, A., M. Önen, and R. Molva, Privacy-preserving content-based publish/subscribe networks. SEC, 2009: p. 270-282.
-
(2009)
SEC
, pp. 270-282
-
-
Shikfa, A.1
Önen, M.2
Molva, R.3
-
15
-
-
79551633017
-
Preventing traffic explosion and achieving source unobservability in multi-hop wireless networks using network coding
-
Yanfei, F., et al. Preventing Traffic Explosion and Achieving Source Unobservability in Multi-Hop Wireless Networks Using Network Coding. in GLOBECOM. 2010.
-
(2010)
GLOBECOM
-
-
Yanfei, F.1
-
16
-
-
84961358854
-
Towards event source unobservability with minimum network traffic in sensor networks
-
ACM
-
Yang, Y., et al. Towards event source unobservability with minimum network traffic in sensor networks. in WiSec. 2008. ACM.
-
(2008)
WiSec
-
-
Yang, Y.1
-
17
-
-
79960880538
-
Maintaining source privacy under eavesdropping and node compromise attacks
-
IEEE
-
Pongaliur, K. and L. Xiao, Maintaining Source Privacy under Eavesdropping and Node Compromise Attacks, in INFOCOM2011: IEEE.
-
INFOCOM2011
-
-
Pongaliur, K.1
Xiao, L.2
-
18
-
-
0032074579
-
Anonymous connections and onion routing
-
Reed, M.G., P.F. Syverson, and D.M. Goldschlag, Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications, 1998. 16(4): p. 482-494.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.G.1
Syverson, P.F.2
Goldschlag, D.M.3
-
19
-
-
84885775524
-
Spray and wait: An efficient routing scheme for intermittently connected mobile networks
-
ACM
-
Spyropoulos, T., K. Psounis, and C.S. Raghavendra, Spray and wait: an efficient routing scheme for intermittently connected mobile networks, in SIGCOMM workshop on DTN.2005, ACM.
-
(2005)
SIGCOMM Workshop on DTN
-
-
Spyropoulos, T.1
Psounis, K.2
Raghavendra, C.S.3
-
20
-
-
84866901335
-
Writing on the clean slate: Implementing a socially-aware protocol in Haggle
-
IEEE
-
Musolesi, M., et al., Writing on the clean slate: Implementing a socially-aware protocol in Haggle, in WoWMoM 2008, IEEE. p. 1-6.
-
(2008)
WoWMoM
, pp. 1-6
-
-
Musolesi, M.1
-
21
-
-
78650880242
-
Anonymizing user location and profile information for privacy-aware mobile services
-
ACM
-
Mano, M. and Y. Ishikawa, Anonymizing user location and profile information for privacy-aware mobile services, in LBSN2010, ACM. p. 68-75.
-
LBSN2010
, pp. 68-75
-
-
Mano, M.1
Ishikawa, Y.2
-
22
-
-
84922954336
-
The ONE simulator for DTN protocol evaluation
-
ICST
-
Keränen, A., J. Ott, and T. Kärkkäinen. The ONE Simulator for DTN Protocol Evaluation. in SIMUTools. 2009. ICST.
-
(2009)
SIMUTools
-
-
Keränen, A.1
Ott, J.2
Kärkkäinen, T.3
-
23
-
-
44049092178
-
Sofia: Social filtering for robust recommendations
-
Dell'Amico, M. and L. Capra, Sofia: Social filtering for robust recommendations. Trust Management II, 2008: p. 135-150.
-
(2008)
Trust Management II
, pp. 135-150
-
-
Dell'Amico, M.1
Capra, L.2
-
24
-
-
56749091843
-
Exploiting self-reported social networks for routing in ubiquitous computing environments
-
Bigwood, G., et al., Exploiting Self-Reported Social Networks for Routing in Ubiquitous Computing Environments, in WIMOB 2008.
-
(2008)
WIMOB
-
-
Bigwood, G.1
|