메뉴 건너뛰기




Volumn , Issue , 2013, Pages

Preserving smartphone users' anonymity in cloudy days

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC WIRELESS NETWORKS; ADVERSARY MODELING; ANONYMOUS COMMUNICATION; BACKUP/RECOVERY; CELLULAR NETWORK; END-TO-END COMMUNICATION; MOBILE COMPUTATIONS; PRIVACY PROBLEMS;

EID: 84891384442     PISSN: 10952055     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCCN.2013.6614170     Document Type: Conference Paper
Times cited : (6)

References (20)
  • 1
    • 84875482468 scopus 로고    scopus 로고
    • Optimal solutions for pairing services on smartphones: A strategy to minimize energy consumption
    • M. Conti, D. Diodati, C. M. Pinotti, and B. Crispo, "Optimal solutions for pairing services on smartphones: a strategy to minimize energy consumption," in Proc. of IEEE CPSCom '12, 2012.
    • Proc. of IEEE CPSCom '12, 2012
    • Conti, M.1    Diodati, D.2    Pinotti, C.M.3    Crispo, B.4
  • 3
    • 84861596582 scopus 로고    scopus 로고
    • Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading
    • S. Kosta, A. Aucinas, P. Hui, R. Mortier, and X. Zhang, "Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading." in Proc. of IEEE INFOCOM '12, 2012.
    • Proc. of IEEE INFOCOM '12, 2012
    • Kosta, S.1    Aucinas, A.2    Hui, P.3    Mortier, R.4    Zhang, X.5
  • 8
    • 84927627458 scopus 로고    scopus 로고
    • CloneDoc: Exploiting the Cloud to Leverage Secure Group Collaboration Mechanisms for Smartphones
    • S. Kosta, V. C. Perta, J. Stefa, P. Hui, and A. Mei, "CloneDoc: Exploiting the Cloud to Leverage Secure Group Collaboration Mechanisms for Smartphones," in Proc. of IEEE INFOCOM 2013, 2013.
    • Proc. of IEEE INFOCOM 2013, 2013
    • Kosta, S.1    Perta, V.C.2    Stefa, J.3    Hui, P.4    Mei, A.5
  • 11
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • L. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Commun. ACM, vol. 24, pp. 84-90, 1981.
    • (1981) Commun. ACM , vol.24 , pp. 84-90
    • Chaum, L.1
  • 13
    • 76749094667 scopus 로고    scopus 로고
    • Starclique: Guaranteeing user privacy in social networks against intersection attacks
    • K. Puttaswamy, A. Sala, and B. Zhao, "Starclique: guaranteeing user privacy in social networks against intersection attacks," in Proc. of CoNEXT '09, 2009.
    • Proc. of CoNEXT '09, 2009
    • Puttaswamy, K.1    Sala, A.2    Zhao, B.3
  • 14
    • 20544471574 scopus 로고    scopus 로고
    • Sdar: A secure distributed anonymous routing protocol for wireless and mobile ad hoc networks
    • A. Boukerche, K. El-Khatib, L. Xu, and L. Korba, "Sdar: A secure distributed anonymous routing protocol for wireless and mobile ad hoc networks," in Proc. of IEEE LCN '04, 2004.
    • Proc. of IEEE LCN '04, 2004
    • Boukerche, A.1    El-Khatib, K.2    Xu, L.3    Korba, L.4
  • 15
    • 70350090613 scopus 로고    scopus 로고
    • ARM: Anonymous routing protocol for mobile ad hoc networks
    • S. Seys and B. Preneel, "ARM: anonymous routing protocol for mobile ad hoc networks," Int. J. Wire. Mob. Comput., vol. 3, pp. 145-155, 2009.
    • (2009) Int. J. Wire. Mob. Comput. , vol.3 , pp. 145-155
    • Seys, S.1    Preneel, B.2
  • 16
    • 33745945444 scopus 로고    scopus 로고
    • Anondsr: Efficient anonymous dynamic source routing for mobile ad-hoc networks
    • R. Song, L. Korba, and G. Yee, "Anondsr: efficient anonymous dynamic source routing for mobile ad-hoc networks," in Proc. of ACM SASN '05, 2005.
    • Proc. of ACM SASN '05, 2005
    • Song, R.1    Korba, L.2    Yee, G.3
  • 17
    • 84871953737 scopus 로고    scopus 로고
    • Fan: Friendship based anonymous routing in wireless social mobile networks of malicious communities
    • A. Davoli, A. Mei, and J. Stefa, "Fan: friendship based anonymous routing in wireless social mobile networks of malicious communities," in Proc. of ExtremeCom '11, 2011.
    • Proc. of ExtremeCom '11, 2011
    • Davoli, A.1    Mei, A.2    Stefa, J.3
  • 18
    • 79951660476 scopus 로고    scopus 로고
    • Toward Anonymity in Delay Tolerant Networks: Threshold Pivot Scheme
    • R. Jansen and R. Beverly, "Toward Anonymity in Delay Tolerant Networks: Threshold Pivot Scheme," in Proc. of MILCOM '10, 2010.
    • Proc. of MILCOM '10, 2010
    • Jansen, R.1    Beverly, R.2
  • 19
    • 77955422013 scopus 로고    scopus 로고
    • Anti-localization anonymous routing for delay tolerant network
    • X. Lu, P. Hui, D. Towsley, J. Pu, and Z. Xiong, "Anti-localization anonymous routing for delay tolerant network," Computer Networks, vol. 54, no. 11, pp. 1899 - 1910, 2010.
    • (2010) Computer Networks , vol.54 , Issue.11 , pp. 1899-1910
    • Lu, X.1    Hui, P.2    Towsley, D.3    Pu, J.4    Xiong, Z.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.