HOP: Achieving Efficient Anonymity in MANETs by Combining HIP, OLSR, and Pseudonyms
暂无分享,去创建一个
Juan-Carlos Cano | Pietro Manzoni | Carlos Miguel Tavares Calafate | Javier Campos | Marga Nácher | C. Calafate | P. Manzoni | Marga Nácher | Juan-Carlos Cano | Javier Campos
[1] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[2] Hugo Krawczyk,et al. SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols , 2003, CRYPTO.
[3] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[4] Pin-Han Ho,et al. ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.
[5] Dong Hoon Lee,et al. A3RP : Anonymous and Authenticated Ad Hoc Routing Protocol , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).
[6] A. Kannammal,et al. Privacy and Security on Anonymous Routing Protocols in MANET , 2009, 2009 Second International Conference on Computer and Electrical Engineering.
[7] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[8] Yuguang Fang,et al. MASK: anonymous on-demand routing in mobile ad hoc networks , 2006, IEEE Transactions on Wireless Communications.
[9] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.
[10] Mihaela Cardei,et al. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .
[11] Jianfeng Ma,et al. An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks , 2009, 2009 Fifth International Conference on Information Assurance and Security.
[12] Bart Preneel,et al. ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).
[13] Juan-Carlos Cano,et al. An overview of anonymous communications in mobile ad hoc networks , 2012, Wirel. Commun. Mob. Comput..
[14] Xiaoyan Hong,et al. Performance evaluation of anonymous routing protocols in MANETs , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..
[15] Yih-Chun Hu,et al. A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.
[16] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[17] Vint,et al. NS Notes and Documents , 2002 .
[18] Juan-Carlos Cano,et al. Anonymous routing protocols: Impact on performance in MANETs , 2009, 2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems.
[19] Philippe Jacquet,et al. Optimized Link State Routing Protocol (OLSR) , 2003, RFC.
[20] Tongtong Li,et al. SPM: Source Privacy for Mobile Ad Hoc Networks , 2010, EURASIP J. Wirel. Commun. Netw..
[21] Siu-Ming Yiu,et al. ARMR: Anonymous routing protocol with multiple routes for communications in mobile ad hoc networks , 2009, Ad Hoc Networks.
[22] Siguang Chen,et al. Anonymous multipath routing protocol based on secret sharing in mobile ad hoc networks , 2011 .
[23] Gene Tsudik,et al. PRISM: Privacy-friendly routing in suspicious MANETs (and VANETs) , 2008, 2008 IEEE International Conference on Network Protocols.
[24] Pekka Nikander,et al. Host Identity Protocol , 2005 .
[25] Xiaoyan Hong,et al. ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks , 2003, MobiHoc '03.
[26] Andreas Pfitzmann,et al. Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology , 2000, Workshop on Design Issues in Anonymity and Unobservability.