4PR: Privacy preserving routing in mobile delay tolerant networks
暂无分享,去创建一个
[1] Lionel Brunie,et al. A delay and cost balancing protocol for message routing in mobile delay tolerant networks , 2015, Ad Hoc Networks.
[2] Kevin R. Fall,et al. A delay-tolerant network architecture for challenged internets , 2003, SIGCOMM '03.
[3] Mads Dam,et al. Practical Private Information Aggregation in Large Networks , 2010, NordSec.
[4] Lionel Brunie,et al. An investigation on the unwillingness of nodes to participate in mobile delay tolerant network routing , 2013, Int. J. Inf. Manag..
[5] Jie Wu,et al. An Efficient Prediction-Based Routing in Disruption-Tolerant Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[6] K. Psounis,et al. Efficient Routing in Intermittently Connected Mobile Networks: The Single-Copy Case , 2008, IEEE/ACM Transactions on Networking.
[7] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[8] Pan Hui,et al. Distributed community detection in delay tolerant networks , 2007, MobiArch '07.
[9] Amin Vahdat,et al. Epidemic Routing for Partially-Connected Ad Hoc Networks , 2009 .
[10] Artemios G. Voyiatzis,et al. Privacy-preserving routing in delay tolerant networks based on Bloom filters , 2015, 2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[11] Hongyi Wu,et al. Clustering and cluster-based routing protocol for delay-tolerant mobile networks , 2010, IEEE Transactions on Wireless Communications.
[12] Elisa Bertino,et al. Preserving privacy of feedback providers in decentralized reputation systems , 2012, Comput. Secur..
[13] Aniket Kate,et al. Anonymity and security in delay tolerant networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[14] Yan Yang,et al. A Survey of Routing Protocols and Simulations in Delay-Tolerant Networks , 2011, WASA.
[15] Elisa Bertino,et al. A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model , 2013, IEEE Transactions on Information Forensics and Security.
[16] Durgesh Kumar Mishra,et al. Protocols for Getting Maximum Value for Multi-Party Computations , 2010, 2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation.
[17] Jörg Ott,et al. Simulating Mobility and DTNs with the ONE (Invited Paper) , 2010, J. Commun..
[18] Milena Radenkovic,et al. Utilizing social links for location privacy in opportunistic delay-tolerant networks , 2012, 2012 IEEE International Conference on Communications (ICC).
[19] Cauligi S. Raghavendra,et al. Performance analysis of mobility-assisted routing , 2006, MobiHoc '06.
[20] Paul F. Syverson,et al. Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..
[21] Iain Parris,et al. Privacy-enhanced social-network routing , 2012, Comput. Commun..
[22] Zhensheng Zhang,et al. Routing in intermittently connected mobile ad hoc networks and delay tolerant networks: overview and challenges , 2006, IEEE Communications Surveys & Tutorials.
[23] Thierry Turletti,et al. Routing in Delay-Tolerant Networks Comprising Heterogeneous Node Populations , 2009, IEEE Transactions on Mobile Computing.
[24] Lionel Brunie,et al. A Privacy Preserving Prediction-based Routing Protocol for Mobile Delay Tolerant Networks , 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA).
[25] Anders Lindgren,et al. Probabilistic routing in intermittently connected networks , 2003, MOCO.
[26] David Kotz,et al. Extracting a Mobility Model from Real User Traces , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[27] Ellen W. Zegura,et al. ARDEN: Anonymous networking in delay tolerant networks , 2012, Ad Hoc Networks.
[28] Pan Hui,et al. BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks , 2011 .