Message anonymity on predictable opportunistic networks
暂无分享,去创建一个
[1] Rabin K. Patra,et al. Routing in a delay tolerant network , 2004, SIGCOMM '04.
[2] Jari Saramäki,et al. Path lengths, correlations, and centrality in temporal networks , 2011, Physical review. E, Statistical, nonlinear, and soft matter physics.
[3] Minsu Huang,et al. Topology design in time-evolving delay-tolerant networks with unreliable links , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[4] Yih-Chun Hu,et al. CRAWDAD dataset rice/ad_hoc_city (v.2003-09-11) , 2003 .
[5] Albert-László Barabási,et al. Limits of Predictability in Human Mobility , 2010, Science.
[6] Siyuan Chen,et al. Reliable Topology Design in Time-Evolving Delay-Tolerant Networks with Unreliable Links , 2015, IEEE Trans. Mob. Comput..
[7] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[8] Guillermo Navarro-Arribas,et al. Onion Routing in Deterministic Delay Tolerant Networks , 2015, FPS.
[9] Paul F. Syverson,et al. Hiding Routing Information , 1996, Information Hiding.
[10] Leonard Barolli,et al. A multi-objectives based technique for optimized routing in opportunistic networks , 2018, J. Ambient Intell. Humaniz. Comput..
[11] Joaquín García,et al. Onion routing circuit construction via latency graphs , 2013, Comput. Secur..
[12] Scott C. Burleigh,et al. Bundle Protocol Specification , 2007, RFC.
[13] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[14] Guillermo Navarro-Arribas,et al. On the Applicability of Onion Routing on Predictable Delay-Tolerant Networks , 2017, 2017 IEEE 42nd Conference on Local Computer Networks (LCN).
[15] Juan A. Fraire,et al. Routing-aware fair contact plan design for predictable delay tolerant networks , 2015, Ad Hoc Networks.
[16] Afonso Ferreira,et al. Computing Shortest, Fastest, and Foremost Journeys in Dynamic Networks , 2003, Int. J. Found. Comput. Sci..
[17] Nickolai Zeldovich,et al. Vuvuzela: scalable private messaging resistant to traffic analysis , 2015, SOSP.
[18] Bart Preneel,et al. Towards Measuring Anonymity , 2002, Privacy Enhancing Technologies.
[19] Deepak Kumar Sharma,et al. kROp: k-Means clustering based routing protocol for opportunistic networks , 2019, J. Ambient Intell. Humaniz. Comput..
[20] Vassilis Kostakos. Temporal Graphs , 2014, Encyclopedia of Social Network Analysis and Mining.
[21] Donald F. Towsley,et al. Anti-localization anonymous routing for Delay Tolerant Network , 2010, Comput. Networks.
[22] Jie Wu,et al. An Analysis of Onion-Based Anonymous Routing for Delay Tolerant Networks , 2016, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS).
[23] Zhengyi Le,et al. EnPassant: anonymous routing for disruption-tolerant networks with applications in assistive environments , 2011, Secur. Commun. Networks.
[24] Frank L. Rubin,et al. Enumerating all simple paths in a graph , 1978 .
[25] Aniket Kate,et al. Anonymity and security in delay tolerant networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[26] Antonio Alfredo Ferreira Loureiro,et al. Protocols, mobility models and tools in opportunistic networks: A survey , 2014, Comput. Commun..
[27] Joan Borrell,et al. Efficient broadcast in opportunistic networks using optimal stopping theory , 2019, Ad Hoc Networks.
[28] George Danezis,et al. Towards an Information Theoretic Metric for Anonymity , 2002, Privacy Enhancing Technologies.
[29] Vicen Torra,et al. Data Privacy: Foundations, New Developments and the Big Data Challenge , 2017 .
[30] Jari Saramäki,et al. Temporal Networks , 2011, Encyclopedia of Social Network Analysis and Mining.
[31] Ellen W. Zegura,et al. ARDEN: Anonymous networking in delay tolerant networks , 2012, Ad Hoc Networks.