메뉴 건너뛰기




Volumn 7, Issue 3, 2014, Pages 373-386

An anonymous end-to-end communication protocol for mobile cloud environments

Author keywords

Anonymity; mobile cloud computing; mobile communications; smartphone clones

Indexed keywords

ANONYMITY; END-TO-END COMMUNICATION; MOBILE CLOUDS; MOBILE COMMUNICATIONS;

EID: 84907207994     PISSN: 19391374     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSC.2014.2304717     Document Type: Article
Times cited : (40)

References (35)
  • 3
    • 84861596582 scopus 로고    scopus 로고
    • Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading
    • S. Kosta, A. Aucinas, P. Hui, R. Mortier, and X. Zhang, "Thinkair: Dynamic Resource Allocation and Parallel Execution in the Cloud for Mobile Code Offloading, " Proc. IEEE INFOCOM '12, 2012.
    • (2012) Proc. IEEE INFOCOM , pp. 12
    • Kosta, S.1    Aucinas, A.2    Hui, P.3    Mortier, R.4    Zhang, X.5
  • 4
    • 85084163878 scopus 로고    scopus 로고
    • Clone2Clone (C2C): Peer-to-peer networking of smartphones on the cloud
    • S. Kosta, C. Perta, J. Stefa, P. Hui, and A. Mei, "Clone2Clone (C2C): Peer-to-Peer Networking of Smartphones on the Cloud, " Proc. USENIX HotCloud '13, 2013.
    • (2013) Proc. USENIX HotCloud , pp. 13
    • Kosta, S.1    Perta, C.2    Stefa, J.3    Hui, P.4    Mei, A.5
  • 5
    • 84883128081 scopus 로고    scopus 로고
    • To offload or not to Offload? the bandwidth and energy costs of mobile cloud computing
    • M.V. Barbera, S. Kosta, A. Mei, and J. Stefa, "To Offload or Not to Offload? The Bandwidth and Energy Costs of Mobile Cloud Computing, " Proc. IEEE INFOCOM '13, 2013.
    • (2013) Proc. IEEE INFOCOM , pp. 13
    • Barbera, M.V.1    Kosta, S.2    Mei, A.3    Stefa, J.4
  • 8
    • 84904431134 scopus 로고    scopus 로고
    • Mobile offloading in the wild: Findings and lessons learned through a real-life experiment with a new cloud-aware system
    • M.V. Barbera, S. Kosta, A. Mei, V.C. Perta, and J. Stefa, "Mobile Offloading in the Wild: Findings and Lessons Learned through a Real-life Experiment with a New Cloud-aware System, " Proc. IEEE INFOCOM '14, 2014.
    • (2014) Proc. IEEE INFOCOM , pp. 14
    • Barbera, M.V.1    Kosta, S.2    Mei, A.3    Perta, V.C.4    Stefa, J.5
  • 10
    • 84927627458 scopus 로고    scopus 로고
    • Clone Doc: Exploiting the cloud to leverage secure group collaboration mechanisms for smartphones
    • S. Kosta, V.C. Perta, J. Stefa, P. Hui, and A. Mei, "CloneDoc: Exploiting the Cloud to Leverage Secure Group Collaboration Mechanisms for Smartphones, " Proc. IEEE INFOCOM '13, 2013.
    • (2013) Proc. IEEE INFOCOM , pp. 13
    • Kosta, S.1    Perta, V.C.2    Stefa, J.3    Hui, P.4    Mei, A.5
  • 12
    • 84891455911 scopus 로고    scopus 로고
    • Mobile TCP usage characteristics and the feasibility of network migration without infrastructure support
    • A. Rahmati, C. Shepard, A. Nicoara, L. Zhong, and P. Singh, "Mobile TCP Usage Characteristics and the Feasibility of Network Migration without Infrastructure Support, " Proc. ACM MobiCom '10, 2010.
    • (2010) Proc. ACM MobiCom , pp. 10
    • Rahmati, A.1    Shepard, C.2    Nicoara, A.3    Zhong, L.4    Singh, P.5
  • 15
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • L. Chaum, "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, " Comm. ACM, vol. 24, pp. 84-90, 1981.
    • (1981) Comm. ACM , vol.24 , pp. 84-90
    • Chaum, L.1
  • 21
    • 70350090613 scopus 로고    scopus 로고
    • ARM: Anonymous routing protocol for mobile ad hoc networks
    • S. Seys and B. Preneel, "ARM: Anonymous Routing Protocol for Mobile Ad Hoc Networks, " Int'l J. Wireless and Mobile Computing, vol. 3, pp. 145-155, 2009.
    • (2009) Int'l J. Wireless and Mobile Computing , vol.3 , pp. 145-155
    • Seys, S.1    Preneel, B.2
  • 22
    • 33748622050 scopus 로고    scopus 로고
    • MASK: Anonymous on-demand routing in mobile ad hoc networks
    • Sept.
    • Y. Zhang, W. Liu, W. Lou, and Y. Fang, "MASK: Anonymous On-Demand Routing in Mobile Ad Hoc Networks, " IEEE Trans. Wireless Computing, vol. 21, no. 9, pp. 2376-2385, Sept. 2006.
    • (2006) IEEE Trans. Wireless Computing , vol.21 , Issue.9 , pp. 2376-2385
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4
  • 24
    • 77955422013 scopus 로고    scopus 로고
    • Anti-localization anonymous routing for delay tolerant network
    • X. Lu, P. Hui, D. Towsley, J. Pu, and Z. Xiong, "Anti-Localization Anonymous Routing for Delay Tolerant Network, " Computer Networks, vol. 54, no. 11, pp. 1899-1910, 2010.
    • (2010) Computer Networks , vol.54 , Issue.11 , pp. 1899-1910
    • Lu, X.1    Hui, P.2    Towsley, D.3    Pu, J.4    Xiong, Z.5
  • 27
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' identities in microdata release
    • Nov./Dec.
    • P. Samarati, "Protecting Respondents' Identities in Microdata Release, " IEEE Trans. Knowledge and Data Eng., vol. 13, no. 6, pp. 1010-1027, Nov./Dec. 2001.
    • (2001) IEEE Trans. Knowledge and Data Eng. , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 28
    • 0016643763 scopus 로고
    • Packet switching in radio channels, Part II-The Hidden Terminal problem in carrier sense multiple access and the busy tone solution
    • Dec.
    • L. Kleinrock and F. Tobagi, "Packet Switching in Radio Channels, Part II-the Hidden Terminal Problem in Carrier Sense Multiple Access and the Busy Tone Solution, " IEEE Trans. Computers, vol. COM-23, no. 12, pp. 1417-1433, Dec. 1975.
    • (1975) IEEE Trans. Computers , vol.COM-23 , Issue.12 , pp. 1417-1433
    • Kleinrock, L.1    Tobagi, F.2
  • 29
    • 79952988817 scopus 로고    scopus 로고
    • Map-based location and tracking in multipath outdoor mobile networks
    • Mar.
    • M. Anisetti, C. Ardagna, V. Bellandi, E. Damiani, and S. Reale, "Map-Based Location and Tracking in Multipath Outdoor Mobile Networks, " IEEE Trans. Wireless Comm., vol. 10, no. 3, pp. 814-824, Mar. 2011.
    • (2011) IEEE Trans. Wireless Comm. , vol.10 , Issue.3 , pp. 814-824
    • Anisetti, M.1    Ardagna, C.2    Bellandi, V.3    Damiani, E.4    Reale, S.5
  • 31
    • 14544273666 scopus 로고    scopus 로고
    • The predecessor attack: An analysis of a threat to anonymous communications systems
    • M. Wright, M. Adler, B.N. Levine, and C. Shields, "The Predecessor Attack: An Analysis of a threat to Anonymous Communications Systems, " ACM Trans. Information and System Security, vol. 7, no. 4, pp. 489-522, 2004.
    • (2004) ACM Trans. Information and System Security , vol.7 , Issue.4 , pp. 489-522
    • Wright, M.1    Adler, M.2    Levine, B.N.3    Shields, C.4
  • 32
    • 84861139529 scopus 로고    scopus 로고
    • Give2Get: Forwarding in social mobile wireless networks of selfish individuals
    • July
    • A. Mei and J. Stefa, "Give2Get: Forwarding in Social Mobile Wireless Networks of Selfish Individuals, " IEEE Trans. Dependable and Secure Computing, vol. 9, no. 4, pp. 569-582, July 2012.
    • (2012) IEEE Trans. Dependable and Secure Computing , vol.9 , Issue.4 , pp. 569-582
    • Mei, A.1    Stefa, J.2
  • 33
    • 25844488399 scopus 로고    scopus 로고
    • Enforcing service availability in mobile ad-hoc WANs
    • L. Buttyan and J.-P. Hubaux, "Enforcing Service Availability in Mobile Ad-Hoc WANs, " Proc. ACM MobiHoc '00, 2000.
    • (2000) Proc. ACM MobiHoc '00
    • Buttyan, L.1    Hubaux, J.-P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.