Protection Against Mobile Tracing Through Motion-MIX for Mobile Wireless Nodes
暂无分享,去创建一个
Xiaoyan Hong | Jiejun Kong | Dapeng Wu | D. Wu | X. Hong | J. Kong
[1] Claude Castelluccia,et al. Shake them up!: a movement-based pairing protocol for CPU-constrained devices , 2005, MobiSys '05.
[2] Radha Poovendran,et al. AMOEBA: Robust Location Privacy Scheme for VANET , 2007, IEEE Journal on Selected Areas in Communications.
[3] Bart Preneel,et al. Towards Measuring Anonymity , 2002, Privacy Enhancing Technologies.
[4] Wade Trappe,et al. Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.
[5] Qi He,et al. The quest for personal control over mobile location privacy , 2004, IEEE Communications Magazine.
[6] Mohamed F. Mokbel,et al. Privacy in Location-Based Services: State-of-the-Art and Research Directions , 2007, 2007 International Conference on Mobile Data Management.
[7] Kevin R. Fall,et al. A delay-tolerant network architecture for challenged internets , 2003, SIGCOMM '03.
[8] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[9] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[10] Peter Ifju,et al. Flexible-wing-based Micro Air Vehicles , 2002 .
[11] George Danezis,et al. Towards an Information Theoretic Metric for Anonymity , 2002, Privacy Enhancing Technologies.
[12] Xiaoyan Hong,et al. An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks , 2007, IEEE Transactions on Mobile Computing.
[13] Frank Stajano,et al. Mix zones: user privacy in location-aware services , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[14] Xiaoyan Hong,et al. ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks , 2003, MobiHoc '03.
[15] Dijiang Huang. Traffic analysis-based unlinkability measure for IEEE 802.11b-based communication systems , 2006, WiSe '06.
[16] Andreas Pfitzmann,et al. Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[17] N. Asokan,et al. Untraceability in mobile networks , 1995, MobiCom '95.
[18] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[19] Michel Barbeau,et al. Detecting rogue devices in bluetooth networks using radio frequency fingerprinting , 2006, Communications and Computer Networks.
[20] Oded Goldreich,et al. Foundations of Cryptography: Basic Tools , 2000 .
[21] Christian Wagner,et al. The Spatial Node Distribution of the Random Waypoint Mobility Model , 2002, WMAN.
[22] Birgit Pfitzmann,et al. Real-time mixes: a bandwidth-efficient anonymity protocol , 1998, IEEE J. Sel. Areas Commun..
[23] Srdjan Capkun,et al. Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[24] Maxim Raya,et al. Mix-Zones for Location Privacy in Vehicular Networks , 2007 .
[25] Helen J. Wang,et al. A Framework for Location Privacy in Wireless Networks , 2005 .
[26] Marco Gruteser,et al. USENIX Association , 1992 .
[27] Ronggong Song,et al. AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks , 2005, SASN '05.
[28] Kaoru Sezaki,et al. Enhancing wireless location privacy using silent period , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[29] Larry J. Greenstein,et al. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.
[30] Oded Goldreich. Foundations of Cryptography: Index , 2001 .
[31] Wenjing Lou,et al. Anonymous communications in mobile ad hoc networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[32] Azzedine Boukerche,et al. SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[33] Pin-Han Ho,et al. ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.
[34] Claude Castelluccia,et al. Packet Coding for Strong Anonymity in Ad Hoc Networks , 2006, 2006 Securecomm and Workshops.
[35] David R. Cheriton,et al. Detecting identity-based attacks in wireless networks using signalprints , 2006, WiSe '06.
[36] Paul F. Syverson,et al. Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[37] Vinton G. Cerf,et al. Delay-tolerant networking: an approach to interplanetary Internet , 2003, IEEE Commun. Mag..
[38] BettstetterChristian. Mobility modeling in wireless networks , 2001 .
[39] Oded Goldreich,et al. Foundations of Cryptography: List of Figures , 2001 .
[40] Markus Jakobsson,et al. Discount Anonymous On Demand Routing for Mobile Ad hoc Networks , 2006, 2006 Securecomm and Workshops.
[41] Michel Barbeau,et al. DETECTION OF TRANSIENT IN RADIO FREQUENCY FINGERPRINTING USING SIGNAL PHASE , 2003 .
[42] Christian Bettstetter,et al. Mobility modeling in wireless networks: categorization, smooth movement, and border effects , 2001, MOCO.
[43] Shu Jiang. An Anonymous MAC Protocol for Wireless Ad-hoc Networks , 2007 .
[44] Shivakant Mishra,et al. Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks , 2004, International Conference on Dependable Systems and Networks, 2004.
[45] Hugo Krawczyk,et al. Untraceable mobility or how to travel incognito , 1999, Comput. Networks.