PRIVO: A privacy-preserving opportunistic routing protocol for delay tolerant networks
暂无分享,去创建一个
Miguel Correia | Naércio Magaia | Carlos Borrego | Paulo Pereira | Naércio Magaia | M. Correia | C. Borrego | P. Pereira
[1] Jim Kurose,et al. Computer Networking: A Top-Down Approach , 1999 .
[2] Milena Radenkovic,et al. Adaptive user anonymity for mobile opportunistic networks , 2012, CHANTS '12.
[3] Ian Goldberg,et al. Louis, Lester and Pierre: Three Protocols for Location Privacy , 2007, Privacy Enhancing Technologies.
[4] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[5] Johan A. Pouwelse,et al. Building a privacy-preserving semantic overlay for Peer-to-Peer networks , 2013, 2013 IEEE International Workshop on Information Forensics and Security (WIFS).
[6] Paolo Santi,et al. Privacy-preserving interest-casting in opportunistic networks , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).
[7] R. Fisher. FREQUENCY DISTRIBUTION OF THE VALUES OF THE CORRELATION COEFFIENTS IN SAMPLES FROM AN INDEFINITELY LARGE POPU;ATION , 1915 .
[8] Pan Hui,et al. BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks , 2008, IEEE Transactions on Mobile Computing.
[9] Ke Xu,et al. A Survey of Social-Aware Routing Protocols in Delay Tolerant Networks: Applications, Taxonomy and Design-Related Issues , 2014, IEEE Communications Surveys & Tutorials.
[10] Chadi Assi,et al. Disruption-Tolerant Networking: A Comprehensive Survey on Recent Developments and Persisting Challenges , 2012, IEEE Communications Surveys & Tutorials.
[11] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[12] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[13] Thrasyvoulos Spyropoulos,et al. Know Thy Neighbor: Towards Optimal Mapping of Contacts to Social Graphs for DTN Routing , 2010, 2010 Proceedings IEEE INFOCOM.
[14] Refik Molva,et al. Privacy and confidentiality in context-based and epidemic forwarding , 2010, Comput. Commun..
[15] Amin Vahdat,et al. Epidemic Routing for Partially-Connected Ad Hoc Networks , 2009 .
[16] M. McPherson,et al. Birds of a Feather: Homophily in Social Networks , 2001 .
[17] Lei Chen,et al. A Survey of Privacy-Preservation of Graphs and Social Networks , 2010, Managing and Mining Graph Data.
[18] Martin Everett,et al. Ego network betweenness , 2005, Soc. Networks.
[19] Anders Lindgren,et al. Probabilistic Routing in Intermittently Connected Networks , 2004, SAPIR.
[20] Susana Sargento,et al. Opportunistic routing based on daily routines , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[21] Dimitrios-Georgios Akestoridis. CRAWDAD dataset uoi/haggle (v.2016-08-28) , 2016 .
[22] Jörg Ott,et al. The ONE simulator for DTN protocol evaluation , 2009, SIMUTools 2009.
[23] Miguel Correia,et al. Betweenness centrality in Delay Tolerant Networks: A survey , 2015, Ad Hoc Networks.
[24] Iain Parris,et al. Privacy-enhanced social-network routing , 2012, Comput. Commun..
[25] Lorenzo Bracciale,et al. CRAWDAD dataset roma/taxi (v.2014-07-17) , 2014 .
[26] Mads Haahr,et al. Social network analysis for routing in disconnected delay-tolerant MANETs , 2007, MobiHoc '07.
[27] Carlos Borrego,et al. PrivHab+: A secure geographic routing protocol for DTN , 2016, Comput. Commun..
[28] Paulo Rogerio Pereira,et al. Security in Delay-Tolerant Mobile Cyber-Physical Applications , 2015 .
[29] Donald F. Towsley,et al. Anti-localization anonymous routing for Delay Tolerant Network , 2010, Comput. Networks.