메뉴 건너뛰기




Volumn , Issue , 2013, Pages 270-274

Untraceability of mobile devices in wireless mesh networks using linear network coding

Author keywords

[No Author keywords available]

Indexed keywords

CODED MESSAGES; COMMUNICATION OVERHEADS; INTERMEDIATE NODE; PRIVACY REQUIREMENTS; SUFFICIENT AND NECESSARY CONDITION; TRAFFIC ANALYSIS ATTACKS; UN TRACEABILITYS; WIRELESS MESH NETWORKS (WMNS);

EID: 84883063317     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2013.6566777     Document Type: Conference Paper
Times cited : (6)

References (22)
  • 1
    • 27844590384 scopus 로고    scopus 로고
    • A survey on wireless mesh networks
    • IEEE
    • I. Akyildiz and X. Wang, "A survey on wireless mesh networks," IEEE Communications Magazine, vol. 43, no. 9, pp. S23-S30, 2005.
    • (2005) Communications Magazine , vol.43 , Issue.9
    • Akyildiz, I.1    Wang, X.2
  • 2
    • 38549121414 scopus 로고    scopus 로고
    • Asrpake: An anonymous secure routing protocol with authenticated key exchange for wireless ad hoc networks
    • Glasgow, Scotland
    • X. Lin, R. Lu, Z. Huafei, P.-H. Ho, X. Shen, and Z. Cao, "ASRPAKE: an anonymous secure routing protocol with authenticated key exchange for wireless ad hoc networks," in Proc. of IEEE International Conference on Communications (ICC), Glasgow, Scotland, 2007, pp. 1247-1253.
    • (2007) Proc. of IEEE International Conference on Communications (ICC) , pp. 1247-1253
    • Lin, X.1    Lu, R.2    Huafei, Z.3    Ho, P.-H.4    Shen, X.5    Cao, Z.6
  • 8
    • 0038041177 scopus 로고    scopus 로고
    • Introducing MorphMix: Peer-to-peer based anonymous internet usage with collusion detection
    • M. Rennhard, "Introducing MorphMix: peer-to-peer based anonymous internet usage with collusion detection," in Proc. of the workshop on privacy in the electronic society (WPES), 2002, pp. 91-102.
    • (2002) Proc. of the Workshop on Privacy in the Electronic Society (WPES) , pp. 91-102
    • Rennhard, M.1
  • 13
    • 70349682315 scopus 로고    scopus 로고
    • An efficient privacy-preserving scheme against traffic analysis attacks in network coding
    • Rio De Janeiro, Brazil
    • Y. Fan, Y. Jiang, H. Zhu, and X. Shen, "An efficient privacy-preserving scheme against traffic analysis attacks in network coding," in Proc. of the 28th Conference on Computer Communications (INFOCOM), Rio De Janeiro, Brazil, 2009, pp. 2213-2221.
    • (2009) Proc. of the 28th Conference on Computer Communications (INFOCOM) , pp. 2213-2221
    • Fan, Y.1    Jiang, Y.2    Zhu, H.3    Shen, X.4
  • 20
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Acm, R. Rivest, and D. L. Chaum
    • D. Chaum, C. O. T. Acm, R. Rivest, and D. L. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Communications of the ACM, vol. 24, pp. 84-88, 1981.
    • (1981) Communications of the ACM , vol.24 , pp. 84-88
    • Chaum, D.1
  • 22
    • 84883106716 scopus 로고    scopus 로고
    • Untraceability of mobile devices in wireless mesh networks using linear network coding
    • [Online]
    • J. Wang, K. Lu, J. Wang, and C. Qiao, "Untraceability of mobile devices in wireless mesh networks using linear network coding," Tech. Rep. [Online]. Available: http://www.cs.cityu.edu.hk/?jianwang/ULNC.pdf
    • Tech. Rep.
    • Wang, J.1    Lu, K.2    Wang, J.3    Qiao, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.