MoP-2-MoP - Mobile Private Microblogging
暂无分享,去创建一个
Stefan Katzenbeisser | Erik Tews | Frederik Armknecht | Ahmad-Reza Sadeghi | Marius Senftleben | Mihai Bucicoiu
[1] Eyal de Lara,et al. User mobility for opportunistic ad-hoc networking , 2004, Sixth IEEE Workshop on Mobile Computing Systems and Applications.
[2] Elmar Gerhards-Padilla,et al. BonnMotion: a mobility scenario generation and analysis tool , 2010, SimuTools.
[3] Michael Rogers,et al. Secure communication over diverse transports: [short paper] , 2012, WPES '12.
[4] M. Chuah,et al. Spam Detection on Twitter Using Traditional Classifiers , 2011, ATC.
[5] Claudio Soriente,et al. Hummingbird: Privacy at the Time of Twitter , 2012, 2012 IEEE Symposium on Security and Privacy.
[6] Christophe Diot,et al. Impact of Human Mobility on Opportunistic Forwarding Algorithms , 2007, IEEE Transactions on Mobile Computing.
[7] Eric Brewer,et al. Rangzen: Circumventing Government-Imposed Communication Blackouts , 2013 .
[8] Hosung Park,et al. What is Twitter, a social network or a news media? , 2010, WWW '10.
[9] Injong Rhee,et al. Human Mobility Patterns and Their Impact on Delay Tolerant Networks , 2007, HotNets.
[10] Jörg Widmer,et al. Survey on Energy Consumption Entities on the Smartphone Platform , 2011, 2011 IEEE 73rd Vehicular Technology Conference (VTC Spring).
[11] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[12] Tatsuaki Okamoto. Topics in Cryptology – CT-RSA 2004 , 2004, Lecture Notes in Computer Science.
[13] Gene Tsudik,et al. ALARM: Anonymous Location-Aided Routing in Suspicious MANETs , 2007, IEEE Transactions on Mobile Computing.
[14] A. Juels,et al. Universal Re-encryption for Mixnets , 2004, CT-RSA.
[15] Rui L. Aguiar,et al. Support of Anonymity in VANETs - Putting Pseudonymity into Practice , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[16] Liam McNamara,et al. Media sharing based on colocation prediction in urban transport , 2008, MobiCom '08.
[17] Yuguang Fang,et al. MASK: anonymous on-demand routing in mobile ad hoc networks , 2006, IEEE Transactions on Wireless Communications.
[18] Qi He,et al. TwitterRank: finding topic-sensitive influential twitterers , 2010, WSDM '10.
[19] Randolph Baden. LoKI: location-based PKI for social networks , 2011, SIGCOMM.
[20] Micah Sherr,et al. Evading Cellular Data Monitoring with Human Movement Networks , 2010, HotSec.