-
2
-
-
3042699909
-
Measuring anonymity: The disclosure attack
-
D. Agrawal and D. Kedogan. Measuring anonymity: The disclosure attack. IEEE Security & privacy, 1(6):27-34, 2003.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.6
, pp. 27-34
-
-
Agrawal, D.1
Kedogan, D.2
-
4
-
-
77749271080
-
Query privacy in wireless sensor networks
-
Mar.
-
B. Carbunar, Y. Yu, W. Shi, M. Pearce, and V. Vasudevan. Query privacy in wireless sensor networks. ACM Trans. Sen. Netw., 6(2):14:1-14:34, Mar. 2010.
-
(2010)
ACM Trans. Sen. Netw.
, vol.6
, Issue.2
, pp. 141-1434
-
-
Carbunar, B.1
Yu, Y.2
Shi, W.3
Pearce, M.4
Vasudevan, V.5
-
5
-
-
0019532104
-
Untraceable electronic mail, Return addresses, and digital pseudonyms
-
Feb.
-
D. L. Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Commun. ACM, 24(2):84-90, Feb. 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.L.1
-
7
-
-
84905828657
-
-
Last accessed: September
-
Crossbow Technology, Inc. MICAz Wireless Measurement System. http://www.openautomation.net/uploadsproductos/micaz-datasheet.pdf. Last accessed: September 2014.
-
(2014)
MICAz Wireless Measurement System.
-
-
-
8
-
-
84957800033
-
Towards measuring anonymity
-
Berlin, Heidelberg, Springer-Verlag
-
C. Díaz, S. Seys, J. Claessens, and B. Preneel. Towards measuring anonymity. In Proceedings of the 2nd international conference on Privacy enhancing technologies, PET'02, pages 54-68, Berlin, Heidelberg, 2003. Springer-Verlag.
-
(2003)
Proceedings of the 2nd International Conference on Privacy Enhancing Technologies, PET'02
, pp. 54-68
-
-
Díaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
10
-
-
0003979335
-
-
Basic Applications. Cambridge University Press, New York, NY, USA, 1st edition
-
O. Goldreich. Foundations of Cryptography: Volume 2, Basic Applications. Cambridge University Press, New York, NY, USA, 1st edition, 2009.
-
(2009)
Foundations of Cryptography
, vol.2
-
-
Goldreich, O.1
-
11
-
-
35248900308
-
Limits of anonymity in open environments
-
Springer
-
D. Kedogan, D. Agrawal, and S. Penz. Limits of anonymity in open environments. In Information Hiding, pages 53-69. Springer, 2003.
-
(2003)
Information Hiding
, pp. 53-69
-
-
Kedogan, D.1
Agrawal, D.2
Penz, S.3
-
12
-
-
59849111340
-
-
PhD thesis, Carnegie Mellon University, July Available from
-
L. Kissner. Privacy-Preserving Distributed Information Sharing. PhD thesis, Carnegie Mellon University, July 2006. Available from http: //www.cs.cmu.edu/~leak/papers/thesis.pdf.
-
(2006)
Privacy-Preserving Distributed Information Sharing.
-
-
Kissner, L.1
-
14
-
-
18844399081
-
TOSSIM: Accurate and scalable simulation of entire tinyos applications
-
New York, NY, USA, ACM
-
P. Levis, N. Lee, M. Welsh, and D. Culler. TOSSIM: Accurate and Scalable Simulation of Entire TinyOS Applications. In Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, SenSys '03, pages 126-137, New York, NY, USA, 2003. ACM.
-
(2003)
Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, SenSys '03
, pp. 126-137
-
-
Levis, P.1
Lee, N.2
Welsh, M.3
Culler, D.4
-
16
-
-
78649989557
-
-
Master's thesis, University of Waterloo, Dec. Aug v0.34
-
A. Pfitzmann and M. Hansen. A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management. http://dud.inf.tu-dresden.de/literatur/Anon-Terminology-v0.34.pdf, Aug. 2010. v0.34.
-
(2010)
A Terminology for Talking About Privacy by Data Minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management.
-
-
Pfitzmann, A.1
Hansen, M.2
-
17
-
-
84937555407
-
Traffic analysis: Protocols, attacks, design issues, and open problems
-
Springer
-
J.-F. Raymond. Traffic analysis: Protocols, attacks, design issues, and open problems. In Designing Privacy Enhancing Technologies, pages 10-29. Springer, 2001.
-
(2001)
Designing Privacy Enhancing Technologies
, pp. 10-29
-
-
Raymond, J.-F.1
-
18
-
-
0002054934
-
Crowds: Anonymity for web transactions
-
Nov.
-
M. K. Reiter and A. D. Rubin. Crowds: Anonymity for Web Transactions. ACM Trans. Inf. Syst. Secur., 1(1):66-92, Nov. 1998.
-
(1998)
ACM Trans. Inf. Syst. Secur.
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.K.1
Rubin, A.D.2
-
19
-
-
84957802536
-
Towards an information theoretic metric for anonymity
-
Berlin, Heidelberg, Springer-Verlag
-
A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In Proceedings of the 2nd international conference on Privacy enhancing technologies, PET'02, pages 41-53, Berlin, Heidelberg, 2003. Springer-Verlag.
-
(2003)
Proceedings of the 2nd International Conference on Privacy Enhancing Technologies, PET'02
, pp. 41-53
-
-
Serjantov, A.1
Danezis, G.2
-
20
-
-
51349086896
-
Towards statistically strong source anonymity for sensor networks
-
IEEE, pages -, April
-
M. Shao, Y. Yang, S. Zhu, and G. Cao. Towards Statistically Strong Source Anonymity for Sensor Networks. In INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, pages -, April 2008.
-
(2008)
INFOCOM 2008. The 27th Conference on Computer Communications
-
-
Shao, M.1
Yang, Y.2
Zhu, S.3
Cao, G.4
-
22
-
-
0038148416
-
Defending anonymous communications against passive logging attacks
-
IEEE
-
M. Wright, M. Adler, B. N. Levine, and C. Shields. Defending anonymous communications against passive logging attacks. In Security and Privacy, 2003. Proceedings. 2003 Symposium on, pages 28-41. IEEE, 2003.
-
(2003)
Security and Privacy, 2003. Proceedings. 2003 Symposium on
, pp. 28-41
-
-
Wright, M.1
Adler, M.2
Levine, B.N.3
Shields, C.4
-
23
-
-
56749163645
-
Towards event source unobservability with minimum network traffic in sensor networks
-
New York, NY, USA, ACM
-
Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao. Towards Event Source Unobservability with Minimum Network Traffic in Sensor Networks. In Proceedings of the First ACM Conference on Wireless Network Security, WiSec '08, pages 77-88, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the First ACM Conference on Wireless Network Security, WiSec '08
, pp. 77-88
-
-
Yang, Y.1
Shao, M.2
Zhu, S.3
Urgaonkar, B.4
Cao, G.5
|