메뉴 건너뛰기




Volumn 12, Issue 3, 2013, Pages

Providing users' anonymity in mobile hybrid networks

Author keywords

Anonymity; Mobile hybrid networks; Privacy

Indexed keywords

ANONYMITY; HYBRID NETWORK; MICRO-PAYMENT SCHEMES; MOBILE NETWORK OPERATORS; MOBILE SCENARIOS; NETWORK OVERHEAD; PROBABILISTIC MODELS; PROTOTYPE IMPLEMENTATIONS;

EID: 84878595251     PISSN: 15335399     EISSN: 15576051     Source Type: Journal    
DOI: 10.1145/2461321.2461322     Document Type: Article
Times cited : (14)

References (54)
  • 1
    • 54849405011 scopus 로고    scopus 로고
    • Improving security and performance of an ad hoc network through a multipath routing strategy
    • Aiache, H., Haettel, F., Lebrun, L., and Tavernier, C. 2008. Improving security and performance of an ad hoc network through a multipath routing strategy. J. Comput. Virol. 4, 4, 267-278.
    • (2008) J. Comput. Virol. , vol.4 , Issue.4 , pp. 267-278
    • Aiache, H.1    Haettel, F.2    Lebrun, L.3    Tavernier, C.4
  • 10
    • 70349257509 scopus 로고    scopus 로고
    • Privacy in location-based applications: Research issues and emerging trends
    • Springer
    • Bettini, C., Jajodia, S., Samarati, P., and Wang S., Eds. 2009. Privacy in Location-Based Applications: Research Issues and Emerging Trends, Lecture Notes of Computer Science, vol. 5599, Springer.
    • (2009) Lecture Notes of Computer Science , vol.5599
    • Bettini, C.1    Jajodia, S.2    Samarati, P.3    Wang, S.4
  • 11
    • 0033749075 scopus 로고    scopus 로고
    • Performance analysis of the IEEE 802 11 distributed coordination function
    • Bianchi, G. 2000. Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Select. Areas Comm. 18, 3, 535-547.
    • (2000) IEEE J. Select. Areas Comm. , vol.18 , Issue.3 , pp. 535-547
    • Bianchi, G.1
  • 14
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Chaum, D. 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Comm. ACM 24, 2, 84-88.
    • (1981) Comm. ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 18
    • 79952449865 scopus 로고    scopus 로고
    • Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments
    • Chow, C.-Y., Mokbel, M. F., and Liu, X. 2011. Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. Geoinformatica 15, 351-380.
    • (2011) Geoinformatica , vol.15 , pp. 351-380
    • Chow, C.-Y.1    Mokbel, M.F.2    Liu, X.3
  • 22
    • 67650409732 scopus 로고    scopus 로고
    • ARMR: Anonymous routing protocol with multiple routes for communications in mobile ad hoc networks
    • Dong, Y., Chim, T. W., Li, V. O. K., Yiu, S. M., and Hui, C. K. 2009. ARMR: Anonymous routing protocol with multiple routes for communications in mobile ad hoc networks. Ad Hoc Netw. 7, 8, 1536-1550.
    • (2009) Ad Hoc Netw. , vol.7 , Issue.8 , pp. 1536-1550
    • Dong, Y.1    Chim, T.W.2    Li, V.O.K.3    Yiu, S.M.4    Hui, C.K.5
  • 25
    • 36549043405 scopus 로고    scopus 로고
    • Protecting location privacy with personalized k-anonymity: Architecture and algorithms
    • Gedik, B. and Liu, L. 2008. Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Trans. Mobile Comput. 7, 1, 1-18.
    • (2008) IEEE Trans. Mobile Comput. , vol.7 , Issue.1 , pp. 1-18
    • Gedik, B.1    Liu, L.2
  • 27
    • 85032751370 scopus 로고    scopus 로고
    • Mobile positioning using wireless networks: Possibilities and fundamental limitations based on available wireless network measurements
    • Gustafsson, F. and Gunnarsson, F. 2005. Mobile positioning using wireless networks: Possibilities and fundamental limitations based on available wireless network measurements. IEEE Signal Process. Magazine. 41-53.
    • (2005) IEEE Signal Process. Magazine , pp. 41-53
    • Gustafsson, F.1    Gunnarsson, F.2
  • 31
    • 78049399140 scopus 로고    scopus 로고
    • UMAC: Message authentication code using universal hashing
    • (Informational). http://www.ietf.org/rfc/rfc4418.txt
    • Krovetz, T. 2006. UMAC: Message authentication code using universal hashing. RFC 4418 (Informational). http://www.ietf.org/rfc/rfc4418.txt.
    • (2006) RFC , vol.4418
    • Krovetz, T.1
  • 34
    • 36749076982 scopus 로고    scopus 로고
    • GSIS: A secure and privacy preserving protocol for vehicular communications
    • Lin, X., Sun, X., Ho, P.-H., and Shen, X. 2007. GSIS: A secure and privacy preserving protocol for vehicular communications. IEEE Trans. Vehic. Tech. 56, 6, 3442-3456.
    • (2007) IEEE Trans. Vehic. Tech. , vol.56 , Issue.6 , pp. 3442-3456
    • Lin, X.1    Sun, X.2    Ho, P.-H.3    Shen, X.4
  • 37
    • 84878559567 scopus 로고    scopus 로고
    • NetStumbler.com. http://www.netstumbler.com/.
  • 38
    • 84878620590 scopus 로고    scopus 로고
    • I2P Anonymous Network
    • I2P Anonymous Network. http://www.i2p2.de/.
  • 40
    • 84878598708 scopus 로고    scopus 로고
    • Wireless Orbit
    • Wireless Orbit. http://www.wirelessorbit.com/.
  • 42
  • 45
    • 80053515818 scopus 로고    scopus 로고
    • Exploiting context-awareness to enhance source-location privacy in wireless sensor networks
    • Rios, R. and Lopez, J. 2011. Exploiting context-awareness to enhance source-location privacy in wireless sensor networks. Comput. J. 54, 11, 1603-1615.
    • (2011) Comput. J. , vol.54 , Issue.11 , pp. 1603-1615
    • Rios, R.1    Lopez, J.2
  • 47
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' identities in microdata release
    • Samarati, P. 2001. Protecting respondents' identities in microdata release. IEEE Trans. Knowl. Data Eng. 13, 6, 1010-1027.
    • (2001) IEEE Trans. Knowl. Data Eng. , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 50
    • 85032752279 scopus 로고    scopus 로고
    • Signal processing techniques in network-aided positioning: A survey of state-of-the-art positioning designs
    • Sun, G., Chen, J., Guo, W., and Ray Liu, K. J. 2005. Signal processing techniques in network-aided positioning: A survey of state-of-the-art positioning designs. IEEE Signal Process. Mag. 12-23.
    • (2005) IEEE Signal Process. Mag , pp. 12-23
    • Sun, G.1    Chen, J.2    Guo, W.3    Ray Liu, K.J.4
  • 52
    • 84878602196 scopus 로고    scopus 로고
    • Wireshark
    • Wireshark. http://www.wireshark.org/.
  • 53
    • 14544273666 scopus 로고    scopus 로고
    • The predecessor attack: An analysis of a threat to anonymous communications systems
    • Wright, M., Adler, M., Neil Levine, B., and Shields, C. 2004. The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Trans. Inf. Syst. Sec. 7, 4, 489-522.
    • (2004) ACM Trans. Inf. Syst. Sec. , vol.7 , Issue.4 , pp. 489-522
    • Wright, M.1    Adler, M.2    Neil Levine, B.3    Shields, C.4
  • 54
    • 33748622050 scopus 로고    scopus 로고
    • MASK: Anonymous on-demand routing in mobile ad hoc networks
    • Zhang, Y., Liu, W., Lou, W., and Fang, Y. 2006. MASK: Anonymous on-demand routing in mobile ad hoc networks. IEEE Trans. Wirel. Comm. 5, 9, 2376-2385.
    • (2006) IEEE Trans. Wirel. Comm. , vol.5 , Issue.9 , pp. 2376-2385
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.