On the Privacy and Performance of Mobile Anonymous Microblogging
暂无分享,去创建一个
Stefan Katzenbeisser | Erik Tews | Marius Senftleben | Matthias Hollick | Mihai Bucicoiu | Ana Barroso | S. Katzenbeisser | M. Hollick | Erik Tews | Marius Senftleben | Ana Barroso | M. Bucicoiu
[1] Xiaoyan Hong,et al. ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks , 2003, MobiHoc '03.
[2] Wenjing Lou,et al. Anonymous communications in mobile ad hoc networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[3] Deva K. Borah,et al. A review of communication-oriented optical wireless systems , 2012, EURASIP J. Wirel. Commun. Netw..
[4] Johan Pouwelse,et al. Media without censorship (CensorFree) scenarios , 2012 .
[5] Tracy Camp,et al. A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..
[6] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[7] Pierre St. Juste,et al. Enabling decentralized microblogging through P2PVPNs , 2013, 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC).
[8] Claudio Soriente,et al. Hummingbird: Privacy at the Time of Twitter , 2012, 2012 IEEE Symposium on Security and Privacy.
[9] Micah Sherr,et al. Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks , 2012, ESORICS.
[10] Elmar Gerhards-Padilla,et al. BonnMotion: a mobility scenario generation and analysis tool , 2010, SimuTools.
[11] Bharat K. Bhargava,et al. Private Anonymous Messaging , 2012, 2012 IEEE 31st Symposium on Reliable Distributed Systems.
[12] Ronggong Song,et al. AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks , 2005, SASN '05.
[13] George Danezis,et al. On the PET Workshop Panel "Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?" , 2004, Privacy Enhancing Technologies.
[14] Minho Shin,et al. AnonySense: A system for anonymous opportunistic sensing , 2011, Pervasive Mob. Comput..
[15] Imad Aad,et al. The Mobile Data Challenge: Big Data for Mobile Computing Research , 2012 .
[16] Burkhard Englert,et al. Megaphone: Fault Tolerant, Scalable, and Trustworthy P2P Microblogging , 2010, 2010 Fifth International Conference on Internet and Web Applications and Services.
[17] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[18] Sushil Jajodia,et al. Providing Users’ Anonymity in Mobile Hybrid Networks , 2013, TOIT.
[19] Matthew Smith,et al. Helping Johnny 2.0 to encrypt his Facebook conversations , 2012, SOUPS.
[20] Mohan S. Kankanhalli,et al. Anonymous secure routing in mobile ad-hoc networks , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[21] Pierre St. Juste,et al. Litter: A Lightweight Peer-to-Peer Microblogging Service , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[22] Azzedine Boukerche,et al. SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[23] Qi He,et al. TwitterRank: finding topic-sensitive influential twitterers , 2010, WSDM '10.
[24] Paul F. Syverson,et al. Hiding Routing Information , 1996, Information Hiding.
[25] Brent Waters,et al. Anon-Pass: Practical Anonymous Subscriptions , 2013, IEEE Security & Privacy.
[26] A. Juels,et al. Universal Re-encryption for Mixnets , 2004, CT-RSA.
[27] Bart Preneel,et al. ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).
[28] Jörg Ott,et al. Floating content: Information sharing in urban areas , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[29] Mitsuji Matsumoto,et al. WLC10-3: IrSimple Modeling and Performance Evaluation for High-Speed Infrared Communications , 2006, IEEE Globecom 2006.
[30] Jorma T. Virtamo,et al. Criticality condition for information floating with random walk of nodes , 2013, Perform. Evaluation.
[31] Srikanth V. Krishnamurthy,et al. Twitsper: Tweeting privately , 2013, IEEE Security & Privacy.
[32] Max Mühlhäuser,et al. Twitterize: Anonymous Micro-blogging , 2014, 2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA).
[33] Yahel Ben-David. Robin : An Attack-resilient Microblogging Service to Circu mvent Government-Imposed Communication Blackouts , 2011 .
[34] Mauro Conti,et al. An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments , 2014, IEEE Transactions on Services Computing.
[35] Stefan Katzenbeisser,et al. MoP-2-MoP - Mobile Private Microblogging , 2014, Financial Cryptography.
[36] Herbert Bos,et al. Paranoid Android: versatile protection for smartphones , 2010, ACSAC '10.
[37] Mark E. J. Newman,et al. Power-Law Distributions in Empirical Data , 2007, SIAM Rev..
[38] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.