-
1
-
-
27844590384
-
A survey on wireless mesh networks
-
IEEE
-
I. Akyildiz and X. Wang, "A survey on wireless mesh networks," IEEE Communications Magazine, vol. 43, no. 9, pp. S23-S30, 2005.
-
(2005)
Communications Magazine
, vol.43
, Issue.9
-
-
Akyildiz, I.1
Wang, X.2
-
2
-
-
38549121414
-
Asrpake: An anonymous secure routing protocol with authenticated key exchange for wireless ad hoc networks
-
Glasgow, Scotland
-
X. Lin, R. Lu, Z. Huafei, P.-H. Ho, X. Shen, and Z. Cao, "ASRPAKE: an anonymous secure routing protocol with authenticated key exchange for wireless ad hoc networks," in Proc. of IEEE International Conference on Communications (ICC), Glasgow, Scotland, 2007, pp. 1247-1253.
-
(2007)
Proc. of IEEE International Conference on Communications (ICC)
, pp. 1247-1253
-
-
Lin, X.1
Lu, R.2
Huafei, Z.3
Ho, P.-H.4
Shen, X.5
Cao, Z.6
-
3
-
-
0029451888
-
Untraceability in mobile networks
-
New York, USA
-
D. Samfat, R. Molva, and N. Asokan, "Untraceability in mobile networks," in Proc. of the 1st annual international conference on mobile computing and networking, New York, USA, 1995, pp. 26-36.
-
(1995)
Proc. of the 1st Annual International Conference on Mobile Computing and Networking
, pp. 26-36
-
-
Samfat, D.1
Molva, R.2
Asokan, N.3
-
4
-
-
0242696170
-
Anodr: Anonymous on demand routing with untraceable routes for mobile ad-hoc networks
-
New York, USA
-
J. Kong and X. Hong, "ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks," in Proc. of the 4th ACM international symposium on Mobile ad hoc networking and computing (MobiHoc), New York, USA, 2003, pp. 291-302.
-
(2003)
Proc. of the 4th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
, pp. 291-302
-
-
Kong, J.1
Hong, X.2
-
5
-
-
69949088508
-
Anonymity in wireless broadcast networks
-
M. Blaze, J. Ioannidis, A. D. Keromytis, T. Malkin, and A. Rubin, "Anonymity in wireless broadcast networks," International Journal of Network Security, vol. 8, no. 1, pp. 37-51, 2010.
-
(2010)
International Journal of Network Security
, vol.8
, Issue.1
, pp. 37-51
-
-
Blaze, M.1
Ioannidis, J.2
Keromytis, A.D.3
Malkin, T.4
Rubin, A.5
-
6
-
-
34547484913
-
Achieving privacy in mesh networks
-
New York, USA
-
X. Wu and N. Li, "Achieving privacy in mesh networks," in Proc. of the fourth ACM workshop on Security of ad hoc and sensor networks, New York, USA, 2006, pp. 13-22.
-
(2006)
Proc. of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 13-22
-
-
Wu, X.1
Li, N.2
-
7
-
-
77955392216
-
Hyberloc: Providing physical layer location privacy in hybrid sensor networks
-
R. El-Badry, A. Sultan, and M. Youssef, "HyberLoc: providing physical layer location privacy in hybrid sensor networks," in Proc. of IEEE International Conference on Communications (ICC), 2010, pp. 1-5.
-
Proc. of IEEE International Conference on Communications (ICC)
, vol.2010
, pp. 1-5
-
-
El-Badry, R.1
Sultan, A.2
Youssef, M.3
-
8
-
-
0038041177
-
Introducing MorphMix: Peer-to-peer based anonymous internet usage with collusion detection
-
M. Rennhard, "Introducing MorphMix: peer-to-peer based anonymous internet usage with collusion detection," in Proc. of the workshop on privacy in the electronic society (WPES), 2002, pp. 91-102.
-
(2002)
Proc. of the Workshop on Privacy in the Electronic Society (WPES)
, pp. 91-102
-
-
Rennhard, M.1
-
9
-
-
84954409133
-
Mixminion: Design of a type III anonymous remailer protocol
-
G. Danezis, R. Dingledine, D. Hopwood, and N. Mathewson, "Mixminion: Design of a type III anonymous remailer protocol," in Proc. of the Workshop on Privacy in the Electronic Society, 2003, pp. 2-15.
-
(2003)
Proc. of the Workshop on Privacy in the Electronic Society
, pp. 2-15
-
-
Danezis, G.1
Dingledine, R.2
Hopwood, D.3
Mathewson, N.4
-
10
-
-
0032074579
-
Anonymous connections and onion routing
-
M. G. Reed, P. F. Syverson, and D. M. Goldschlag, "Anonymous connections and onion routing," IEEE Journal on Selected Areas in Communications (JSAC), vol. 16, no. 4, pp. 482-494, 1998.
-
(1998)
IEEE Journal on Selected Areas in Communications (JSAC)
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.G.1
Syverson, P.F.2
Goldschlag, D.M.3
-
12
-
-
77958113753
-
Privacy-preserving p2p data sharing with oneswarm
-
Tomas Isdal, Michael Piatek, A. Krishnamurthy, and Thomas Anderson, "Privacy-preserving p2p data sharing with oneswarm," University of Washington, Technical Report, 2009.
-
(2009)
University of Washington, Technical Report
-
-
Isdal, T.1
Piatek, M.2
Krishnamurthy, A.3
Anderson, T.4
-
13
-
-
70349682315
-
An efficient privacy-preserving scheme against traffic analysis attacks in network coding
-
Rio De Janeiro, Brazil
-
Y. Fan, Y. Jiang, H. Zhu, and X. Shen, "An efficient privacy-preserving scheme against traffic analysis attacks in network coding," in Proc. of the 28th Conference on Computer Communications (INFOCOM), Rio De Janeiro, Brazil, 2009, pp. 2213-2221.
-
(2009)
Proc. of the 28th Conference on Computer Communications (INFOCOM)
, pp. 2213-2221
-
-
Fan, Y.1
Jiang, Y.2
Zhu, H.3
Shen, X.4
-
14
-
-
77953319343
-
P-coding: Secure network coding against eavesdropping attacks
-
P. Zhang, Y. Jiang, C. Lin, Y. Fan, and X. Shen, "P-coding: Secure network coding against eavesdropping attacks," in Proc.of the 29th Conference on Computer Communications (INFOCOM), 2010, pp. 1-9.
-
Proc. of the 29th Conference on Computer Communications (INFOCOM)
, vol.2010
, pp. 1-9
-
-
Zhang, P.1
Jiang, Y.2
Lin, C.3
Fan, Y.4
Shen, X.5
-
16
-
-
39349110413
-
Weakly secure network coding
-
Riva del Garda, Italy
-
K. Bhattad and K. R. Narayanan, "Weakly secure network coding," in Proc. of the First Workshop on Network Coding, Theory, and Applications (NetCod), Riva del Garda, Italy, 2005.
-
(2005)
Proc. of the First Workshop on Network Coding, Theory, and Applications (NetCod)
-
-
Bhattad, K.1
Narayanan, K.R.2
-
17
-
-
77953316768
-
Optimal linear network coding design for secure unicast with multiple streams
-
J. Wang, J. Wang, K. Lu, B. Xiao, and N. Gu, "Optimal linear network coding design for secure unicast with multiple streams," in Proc. of the 29th Conference on Computer Communications, 2010, pp. 2240-2248.
-
Proc. of the 29th Conference on Computer Communications
, vol.2010
, pp. 2240-2248
-
-
Wang, J.1
Wang, J.2
Lu, K.3
Xiao, B.4
Gu, N.5
-
18
-
-
79960862937
-
Anonymous communication with network coding against traffic analysis attack
-
Apr.
-
J. Wang, J. Wang, C. Wu, K. Lu, and N. Gu, "Anonymous communication with network coding against traffic analysis attack," in Proc. of the 30th Conference on Computer Communications, Apr. 2011, pp. 1008-1016.
-
Proc. of the 30th Conference on Computer Communications
, vol.2011
, pp. 1008-1016
-
-
Wang, J.1
Wang, J.2
Wu, C.3
Lu, K.4
Gu, N.5
-
19
-
-
0037323073
-
Linear network coding
-
S.-Y.R. Li, R.W. Yeung, and Ning Cai, "Linear network coding," IEEE Transactions on Information Theory, vol. 49, no. 2, pp. 371-381, 2003.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, Issue.2
, pp. 371-381
-
-
Li, S.-Y.R.1
Yeung, R.W.2
Cai, N.3
-
20
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Acm, R. Rivest, and D. L. Chaum
-
D. Chaum, C. O. T. Acm, R. Rivest, and D. L. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Communications of the ACM, vol. 24, pp. 84-88, 1981.
-
(1981)
Communications of the ACM
, vol.24
, pp. 84-88
-
-
Chaum, D.1
-
21
-
-
51349086896
-
Towards statistically strong source anonymity for sensor networks
-
M. Shao, Y. Yang, S. Zhu, and G. Cao, "Towards statistically strong source anonymity for sensor networks," in Proc. of the 27th Conference on Computer Communications (INFOCOM), 2008, pp. 51-55.
-
(2008)
Proc. of the 27th Conference on Computer Communications (INFOCOM)
, pp. 51-55
-
-
Shao, M.1
Yang, Y.2
Zhu, S.3
Cao, G.4
-
22
-
-
84883106716
-
Untraceability of mobile devices in wireless mesh networks using linear network coding
-
[Online]
-
J. Wang, K. Lu, J. Wang, and C. Qiao, "Untraceability of mobile devices in wireless mesh networks using linear network coding," Tech. Rep. [Online]. Available: http://www.cs.cityu.edu.hk/?jianwang/ULNC.pdf
-
Tech. Rep.
-
-
Wang, J.1
Lu, K.2
Wang, J.3
Qiao, C.4
|