Route Extrapolation for Source and Destination Camouflage in Wireless Ad Hoc Networks
暂无分享,去创建一个
[1] Prashant Krishnamurthy,et al. SECLOUD: Source and Destination Seclusion Using Clouds for wireless ad hoc networks , 2009, 2009 IEEE Symposium on Computers and Communications.
[2] Xiaoyan Hong,et al. An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks , 2007, IEEE Transactions on Mobile Computing.
[3] Elisa Bertino,et al. An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks , 2007, IEEE Transactions on Dependable and Secure Computing.
[4] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[5] Marco Gruteser,et al. Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis , 2003, WMASH '03.
[6] Deborah Estrin,et al. Directed diffusion for wireless sensor networking , 2003, TNET.
[7] Latanya Sweeney,et al. Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[8] Yunghsiang Sam Han,et al. A key predistribution scheme for sensor networks using deployment knowledge , 2006, IEEE Transactions on Dependable and Secure Computing.
[9] Wenjing Lou,et al. Anonymous communications in mobile ad hoc networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[10] Sencun Zhu,et al. Towards event source unobservability with minimum network traffic in sensor networks , 2008, WiSec '08.
[11] Dijiang Huang. Unlinkability Measure for IEEE 802.11 Based MANETs , 2008, IEEE Transactions on Wireless Communications.
[12] Dijiang Huang. Traffic analysis-based unlinkability measure for IEEE 802.11b-based communication systems , 2006, WiSe '06.
[13] Weisong Shi,et al. Preserving source location privacy in monitoring-based wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.
[14] Anxiao Jiang,et al. Separability and topology control of quasi unit disk graphs , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[15] L. Zhang,et al. A novel scheme for protecting receiver's location privacy in wireless sensor networks , 2008, IEEE Transactions on Wireless Communications.
[16] Srdjan Capkun,et al. Secure and Privacy-Preserving Communication in Hybrid Ad Hoc Networks , 2004 .
[17] Nitin H. Vaidya,et al. Power-Aware Traffic Cover Mode to Prevent Traffic Analysis in Wireless Ad Hoc Networks , 2000 .
[18] Wade Trappe,et al. Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.
[19] Ben Y. Zhao,et al. Protecting anonymity in dynamic peer-to-peer networks , 2008, 2008 IEEE International Conference on Network Protocols.
[20] Donggang Liu,et al. Location Privacy in Sensor Networks Against a Global Eavesdropper , 2007, 2007 IEEE International Conference on Network Protocols.
[21] Shivakant Mishra,et al. Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[22] Xiaoyan Hong,et al. ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks , 2003, MobiHoc '03.
[23] Shivakant Mishra,et al. Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks , 2006, Pervasive Mob. Comput..
[24] Sencun Zhu,et al. Towards Statistically Strong Source Anonymity for Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[25] Thomas F. La Porta,et al. Privacy Preserving Communication in MANETs , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[26] Liang Zhang,et al. Organizational memory: reducing source-sink distance , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.