NETWORK CODING COMBINED WITH ONION ROUTING FOR ANONYMOUS AND SECURE COMMUNICATION IN A W IRELESS MESH NETWORK
暂无分享,去创建一个
[1] E. Merzari,et al. Large-Scale Simulations on Thermal-Hydraulics in Fuel Bundles of Advanced Nuclear Reactors , 2007 .
[2] Chuang Lin,et al. ANOC: Anonymous Network-Coding-Based Communication with Efficient Cooperation , 2012, IEEE Journal on Selected Areas in Communications.
[3] Tracey Ho,et al. Energy Efficient Opportunistic Network Coding for Wireless Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[4] Sadiq M. Sait,et al. International Journal of Computer Networks & Communications (IJCNC) , 2011 .
[5] Ninghui Li,et al. Achieving privacy in mesh networks , 2006, SASN '06.
[6] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[7] Dharma P. Agrawal,et al. Efficient pairwise key establishment and management in static wireless sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[8] Muriel Médard,et al. XORs in the Air: Practical Wireless Network Coding , 2006, IEEE/ACM Transactions on Networking.
[10] Nagesh Nandiraju,et al. Wireless Mesh Networks: Current Challenges and Future Directions of Web-In-The-Sky , 2007, IEEE Wireless Communications.
[11] Tomoaki Ohtsuki,et al. XOR network coding pollution prevention without homomorphic functions , 2014, 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC).
[12] Donggang Liu,et al. Protecting Location Privacy in Sensor Networks against a Global Eavesdropper , 2012, IEEE Transactions on Mobile Computing.
[13] Yuguang Fang,et al. Security of IEEE 802.16 in Mesh Mode , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[14] Dharma P. Agrawal,et al. Optimizing sensor networks for autonomous unmanned ground vehicles , 2008, Security + Defence.
[15] Jie Wu,et al. Quantitative Measurement and Design of Source-Location Privacy Schemes for Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[16] Bo Zhu,et al. Anonymous User Communication for Privacy Protection in Wireless Metropolitan Mesh Networks , 2010, IEEE Transactions on Vehicular Technology.
[17] Tracey Ho,et al. A Random Linear Network Coding Approach to Multicast , 2006, IEEE Transactions on Information Theory.
[18] Rong Zheng,et al. Efficient algorithms for K-anonymous location privacy in participatory sensing , 2012, 2012 Proceedings IEEE INFOCOM.
[19] Dharma P. Agrawal,et al. Polynomial based scheme (PBS) for establishing Authentic Associations in Wireless Mesh Networks , 2010, J. Parallel Distributed Comput..
[20] Chuan Wu,et al. Anonymous communication with network coding against traffic analysis attack , 2011, 2011 Proceedings IEEE INFOCOM.
[21] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[22] Wade Trappe,et al. Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.
[23] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[24] Rolf Blom,et al. An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.