Preserving Identity Privacy in Wireless Mesh Networks
暂无分享,去创建一个
[1] Jan Camenisch,et al. An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation , 2001, IACR Cryptol. ePrint Arch..
[2] Ninghui Li,et al. Achieving privacy in mesh networks , 2006, SASN '06.
[3] Helen J. Wang,et al. A Framework for Location Privacy in Wireless Networks , 2005 .
[4] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[5] Radha Poovendran,et al. Modeling adaptive node capture attacks in multi-hop wireless networks , 2007, Ad Hoc Networks.
[6] Vallipuram Muthukkumarasamy,et al. Securing Wireless Mesh Networks , 2008, IEEE Internet Computing.
[7] Yuan Xue,et al. Preserving traffic privacy in wireless mesh networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[8] Xiaoyan Hong,et al. Mobility changes anonymity: new passive threats in mobile ad hoc networks , 2006, Wirel. Commun. Mob. Comput..
[9] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[10] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[11] Yuguang Fang,et al. ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks , 2006, IEEE Journal on Selected Areas in Communications.
[12] Xiaoyan Hong,et al. ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks , 2003, MobiHoc '03.
[13] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[14] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .