-
1
-
-
54849405011
-
Improving security and performance of an ad hoc network through a multipath routing strategy
-
Aiache, H., Haettel, F., Lebrun, L., and Tavernier, C. 2008. Improving security and performance of an ad hoc network through a multipath routing strategy. J. Comput. Virol. 4, 4, 267-278.
-
(2008)
J. Comput. Virol.
, vol.4
, Issue.4
, pp. 267-278
-
-
Aiache, H.1
Haettel, F.2
Lebrun, L.3
Tavernier, C.4
-
3
-
-
74049147572
-
PAR: Payment for anonymous routing
-
Androulaki, E., Raykova, M., Srivatsan, S., Stavrou, A., and Bellovin, S. M. 2008. PAR: Payment for anonymous routing. In Proceedings of the 8th Privacy Enhancing Technologies Symposium (PET'08).
-
(2008)
Proceedings of the 8th Privacy Enhancing Technologies Symposium (PET'08)
-
-
Androulaki, E.1
Raykova, M.2
Srivatsan, S.3
Stavrou, A.4
Bellovin, S.M.5
-
4
-
-
79952988817
-
Map-based location and tracking in multipath outdoor mobile networks
-
Anisetti, M., Ardagna, C. A., Bellandi, V., Damiani, E., and Reale, S. 2011. Map-based location and tracking in multipath outdoor mobile networks. IEEE Trans. Wirel. Comm. 10, 3, 814-824.
-
(2011)
IEEE Trans. Wirel. Comm.
, vol.10
, Issue.3
, pp. 814-824
-
-
Anisetti, M.1
Ardagna, C.A.2
Bellandi, V.3
Damiani, E.4
Reale, S.5
-
5
-
-
70349134184
-
A multi-path approach for k-anonymity in mobile hybrid networks
-
Ardagna, C. A., Stavrou, A., Jajodia, S., Samarati, P., and Martin, R. 2008. A multi-path approach for k-anonymity in mobile hybrid networks. In Proceedings of the International Workshop on Privacy in Location-Based Applications (PILBA'08).
-
(2008)
Proceedings of the International Workshop on Privacy in Location-Based Applications (PILBA'08)
-
-
Ardagna, C.A.1
Stavrou, A.2
Jajodia, S.3
Samarati, P.4
Martin, R.5
-
6
-
-
70349132697
-
Privacy preservation over untrusted mobile networks
-
Ardagna, C. A., Jajodia, S., Samarati, P., and Stavrou, A. 2009. Privacy preservation over untrusted mobile networks. In Privacy in Location-Based Applications: Research Issues and Emerging Trends, C. Bettini, S. Jajodia, P. Samarati, and S. Wang Eds., Lecture Notes of Computer Science, Springer.
-
(2009)
Privacy in Location-Based Applications: Research Issues and Emerging Trends
-
-
Ardagna, C.A.1
Jajodia, S.2
Samarati, P.3
Stavrou, A.4
-
7
-
-
78049364161
-
Providing mobile users' anonymity in hybrid networks
-
Ardagna, C. A., Jajodia, S., Samarati, P., and Stavrou, A. 2010. Providing mobile users' anonymity in hybrid networks. In Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS'10).
-
(2010)
Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS'10)
-
-
Ardagna, C.A.1
Jajodia, S.2
Samarati, P.3
Stavrou, A.4
-
8
-
-
78649342447
-
An obfuscation-based approach for protecting location privacy
-
Ardagna, C. A., Cremonini, M., De Capitani di Vimercati, S., and Samarati, P. 2011a. An obfuscation-based approach for protecting location privacy. IEEE Trans. Depend. Secure Comput. 8, 1, 13-27.
-
(2011)
IEEE Trans. Depend. Secure Comput.
, vol.8
, Issue.1
, pp. 13-27
-
-
Ardagna, C.A.1
Cremonini, M.2
De Capitani Di Vimercati, S.3
Samarati, P.4
-
9
-
-
84878572082
-
Personal privacy in mobile networks
-
Governance, Participation, M. Poblet Ed., Springer Science+Business Media B.V
-
Ardagna, C. A., De Capitani di Vimercati, S., and Samarati, P. 2011b. Personal privacy in mobile networks. In Mobile Technologies for Conflict Management: Online Dispute Resolution, Governance, Participation, M. Poblet Ed., Springer Science+Business Media B.V.
-
(2011)
Mobile Technologies for Conflict Management: Online Dispute Resolution
-
-
Ardagna, C.A.1
De Capitani Di Vimercati, S.2
Samarati, P.3
-
10
-
-
70349257509
-
Privacy in location-based applications: Research issues and emerging trends
-
Springer
-
Bettini, C., Jajodia, S., Samarati, P., and Wang S., Eds. 2009. Privacy in Location-Based Applications: Research Issues and Emerging Trends, Lecture Notes of Computer Science, vol. 5599, Springer.
-
(2009)
Lecture Notes of Computer Science
, vol.5599
-
-
Bettini, C.1
Jajodia, S.2
Samarati, P.3
Wang, S.4
-
11
-
-
0033749075
-
Performance analysis of the IEEE 802 11 distributed coordination function
-
Bianchi, G. 2000. Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Select. Areas Comm. 18, 3, 535-547.
-
(2000)
IEEE J. Select. Areas Comm.
, vol.18
, Issue.3
, pp. 535-547
-
-
Bianchi, G.1
-
12
-
-
0010020069
-
UMAC: Fast and secure message authentication
-
Black, J., Halevi, S., Krawczyk, H., Krovetz, T., and Rogaway, P. 1999. UMAC: Fast and secure message authentication. In Proceedings of the 19th Annual International Cryptology Conference (CRYPTO'99).
-
(1999)
Proceedings of the 19th Annual International Cryptology Conference (CRYPTO'99)
-
-
Black, J.1
Halevi, S.2
Krawczyk, H.3
Krovetz, T.4
Rogaway, P.5
-
13
-
-
11244290742
-
-
Tech. rep. IC/2004/10, EPFL-IC, Lausanne, Switzerland
-
Capkun, S., Hubaux, J.-P., and Jakobsson, M. 2004. Secure and privacy-preserving communication in hybrid Ad Hoc networks. Tech. rep. IC/2004/10, EPFL-IC, Lausanne, Switzerland.
-
(2004)
Secure and Privacy-preserving Communication in Hybrid Ad Hoc Networks
-
-
Capkun, S.1
Hubaux, J.-P.2
Jakobsson, M.3
-
14
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D. 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Comm. ACM 24, 2, 84-88.
-
(1981)
Comm. ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
17
-
-
48049085001
-
Privacy preserving communication in MANETs
-
Choia, H., McDaniel, P., and La Porta, T. F. 2007. Privacy preserving communication in MANETs. In Proceedings of the 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON'07).
-
(2007)
Proceedings of the 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON'07)
-
-
Choia, H.1
McDaniel, P.2
La Porta, T.F.3
-
18
-
-
79952449865
-
Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments
-
Chow, C.-Y., Mokbel, M. F., and Liu, X. 2011. Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. Geoinformatica 15, 351-380.
-
(2011)
Geoinformatica
, vol.15
, pp. 351-380
-
-
Chow, C.-Y.1
Mokbel, M.F.2
Liu, X.3
-
19
-
-
79960907469
-
K-anonymity
-
T. Yu and S. Jajodia Eds., Springer-Verlag
-
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., and Samarati, P. 2007. k-Anonymity. In Secure Data Management in Decentralized Systems, T. Yu and S. Jajodia Eds., Springer-Verlag.
-
(2007)
Secure Data Management in Decentralized Systems
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Samarati, P.4
-
20
-
-
85131612415
-
Theory of privacy and anonymity
-
2nd Ed., M. Atallah and M. Blanton Eds., CRC Press
-
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., and Samarati, P. 2009. Theory of privacy and anonymity. In Algorithms and Theory of Computation Handbook 2nd Ed., M. Atallah and M. Blanton Eds., CRC Press.
-
(2009)
Algorithms and Theory of Computation Handbook
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Samarati, P.4
-
22
-
-
67650409732
-
ARMR: Anonymous routing protocol with multiple routes for communications in mobile ad hoc networks
-
Dong, Y., Chim, T. W., Li, V. O. K., Yiu, S. M., and Hui, C. K. 2009. ARMR: Anonymous routing protocol with multiple routes for communications in mobile ad hoc networks. Ad Hoc Netw. 7, 8, 1536-1550.
-
(2009)
Ad Hoc Netw.
, vol.7
, Issue.8
, pp. 1536-1550
-
-
Dong, Y.1
Chim, T.W.2
Li, V.O.K.3
Yiu, S.M.4
Hui, C.K.5
-
25
-
-
36549043405
-
Protecting location privacy with personalized k-anonymity: Architecture and algorithms
-
Gedik, B. and Liu, L. 2008. Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Trans. Mobile Comput. 7, 1, 1-18.
-
(2008)
IEEE Trans. Mobile Comput.
, vol.7
, Issue.1
, pp. 1-18
-
-
Gedik, B.1
Liu, L.2
-
27
-
-
85032751370
-
Mobile positioning using wireless networks: Possibilities and fundamental limitations based on available wireless network measurements
-
Gustafsson, F. and Gunnarsson, F. 2005. Mobile positioning using wireless networks: Possibilities and fundamental limitations based on available wireless network measurements. IEEE Signal Process. Magazine. 41-53.
-
(2005)
IEEE Signal Process. Magazine
, pp. 41-53
-
-
Gustafsson, F.1
Gunnarsson, F.2
-
28
-
-
3042632140
-
A mobility framework for ad hoc wireless networks
-
Hong, X., Kwon, T. J., Gerla, M., Gu, D. L., and Pei, G. 2001. A mobility framework for ad hoc wireless networks. In Proceedings of the 2nd International Conference on Mobile Data Management (MDM'01).
-
(2001)
Proceedings of the 2nd International Conference on Mobile Data Management (MDM'01)
-
-
Hong, X.1
Kwon, T.J.2
Gerla, M.3
Gu, D.L.4
Pei, G.5
-
31
-
-
78049399140
-
UMAC: Message authentication code using universal hashing
-
(Informational). http://www.ietf.org/rfc/rfc4418.txt
-
Krovetz, T. 2006. UMAC: Message authentication code using universal hashing. RFC 4418 (Informational). http://www.ietf.org/rfc/rfc4418.txt.
-
(2006)
RFC
, vol.4418
-
-
Krovetz, T.1
-
32
-
-
33745798251
-
Timing attacks in low-latency mix systems (Extended Abstract)
-
Levine, B. N., Reiter, M. K., Wang, C., and Wright, M. 2004. Timing attacks in low-latency mix systems (Extended Abstract). In Proceedings of the 8th International Financial Cryptography Conference (FC'04).
-
(2004)
Proceedings of the 8th International Financial Cryptography Conference (FC'04)
-
-
Levine, B.N.1
Reiter, M.K.2
Wang, C.3
Wright, M.4
-
33
-
-
77949937457
-
Enhanced location privacy protection of base station in wireless sensor networks
-
Li, X., Wang, X., Zheng, N., Wan, Z., and Gu, M. 2009. Enhanced location privacy protection of base station in wireless sensor networks. In Proceedings of the 5th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN'09).
-
(2009)
Proceedings of the 5th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN'09)
-
-
Li, X.1
Wang, X.2
Zheng, N.3
Wan, Z.4
Gu, M.5
-
34
-
-
36749076982
-
GSIS: A secure and privacy preserving protocol for vehicular communications
-
Lin, X., Sun, X., Ho, P.-H., and Shen, X. 2007. GSIS: A secure and privacy preserving protocol for vehicular communications. IEEE Trans. Vehic. Tech. 56, 6, 3442-3456.
-
(2007)
IEEE Trans. Vehic. Tech.
, vol.56
, Issue.6
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.-H.3
Shen, X.4
-
35
-
-
77955903359
-
A distributed privacy-preserving scheme for location-based queries
-
Magkos, E., Kotzanilolaou, P., Sioutas, S., and Oikonomou, K. 2010. A distributed privacy-preserving scheme for location-based queries. In Proceedings of the 4th IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC'10).
-
(2010)
Proceedings of the 4th IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC'10)
-
-
Magkos, E.1
Kotzanilolaou, P.2
Sioutas, S.3
Oikonomou, K.4
-
37
-
-
84878559567
-
-
NetStumbler.com. http://www.netstumbler.com/.
-
-
-
-
38
-
-
84878620590
-
-
I2P Anonymous Network
-
I2P Anonymous Network. http://www.i2p2.de/.
-
-
-
-
40
-
-
84878598708
-
-
Wireless Orbit
-
Wireless Orbit. http://www.wirelessorbit.com/.
-
-
-
-
41
-
-
84860861701
-
Mobile TCP usage characteristics and the feasibility of network migration without infrastructure support
-
Rahmati, A., Shepard, C., Nicoara, A., Zhong, L., and Singh, P. J. 2010. Mobile TCP usage characteristics and the feasibility of network migration without infrastructure support. In Proceedings of the 16th Annual International Conference on Mobile Computing and Networking (MobiCom'10).
-
(2010)
Proceedings of the 16th Annual International Conference on Mobile Computing and Networking (MobiCom'10)
-
-
Rahmati, A.1
Shepard, C.2
Nicoara, A.3
Zhong, L.4
Singh, P.J.5
-
45
-
-
80053515818
-
Exploiting context-awareness to enhance source-location privacy in wireless sensor networks
-
Rios, R. and Lopez, J. 2011. Exploiting context-awareness to enhance source-location privacy in wireless sensor networks. Comput. J. 54, 11, 1603-1615.
-
(2011)
Comput. J.
, vol.54
, Issue.11
, pp. 1603-1615
-
-
Rios, R.1
Lopez, J.2
-
47
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
Samarati, P. 2001. Protecting respondents' identities in microdata release. IEEE Trans. Knowl. Data Eng. 13, 6, 1010-1027.
-
(2001)
IEEE Trans. Knowl. Data Eng.
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
48
-
-
35349016950
-
AMOEBA: Robust location privacy scheme for VANET
-
Sampigethaya, K., Li, M., Huang, L., and Poovendran, R. 2007. AMOEBA: Robust location privacy scheme for VANET. IEEE J. Sel. Areas Comm. 25, 8, 1569-1589.
-
(2007)
IEEE J. Sel. Areas Comm.
, vol.25
, Issue.8
, pp. 1569-1589
-
-
Sampigethaya, K.1
Li, M.2
Huang, L.3
Poovendran, R.4
-
49
-
-
79551682845
-
AnonySense: A system for anonymous opportunistic sensing
-
Shin, M., Cornelius, C., Peebles, D., Kapadia, A., Kotz, D., and Triandopoulos, N. 2011. AnonySense: A system for anonymous opportunistic sensing. Perv. Mobile Comput. 7, 1, 16-30.
-
(2011)
Perv. Mobile Comput.
, vol.7
, Issue.1
, pp. 16-30
-
-
Shin, M.1
Cornelius, C.2
Peebles, D.3
Kapadia, A.4
Kotz, D.5
Triandopoulos, N.6
-
50
-
-
85032752279
-
Signal processing techniques in network-aided positioning: A survey of state-of-the-art positioning designs
-
Sun, G., Chen, J., Guo, W., and Ray Liu, K. J. 2005. Signal processing techniques in network-aided positioning: A survey of state-of-the-art positioning designs. IEEE Signal Process. Mag. 12-23.
-
(2005)
IEEE Signal Process. Mag
, pp. 12-23
-
-
Sun, G.1
Chen, J.2
Guo, W.3
Ray Liu, K.J.4
-
52
-
-
84878602196
-
-
Wireshark
-
Wireshark. http://www.wireshark.org/.
-
-
-
-
53
-
-
14544273666
-
The predecessor attack: An analysis of a threat to anonymous communications systems
-
Wright, M., Adler, M., Neil Levine, B., and Shields, C. 2004. The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Trans. Inf. Syst. Sec. 7, 4, 489-522.
-
(2004)
ACM Trans. Inf. Syst. Sec.
, vol.7
, Issue.4
, pp. 489-522
-
-
Wright, M.1
Adler, M.2
Neil Levine, B.3
Shields, C.4
-
54
-
-
33748622050
-
MASK: Anonymous on-demand routing in mobile ad hoc networks
-
Zhang, Y., Liu, W., Lou, W., and Fang, Y. 2006. MASK: Anonymous on-demand routing in mobile ad hoc networks. IEEE Trans. Wirel. Comm. 5, 9, 2376-2385.
-
(2006)
IEEE Trans. Wirel. Comm.
, vol.5
, Issue.9
, pp. 2376-2385
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
|