Anonymous Group Communication in Mobile Networks
暂无分享,去创建一个
[1] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[2] Levente Buttyán,et al. Accountable anonymous access to services in mobile communication systems , 1999, Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems.
[3] Douglas R. Stinson,et al. Cryptography: Theory and Practice,Second Edition , 2002 .
[4] Qi Shi,et al. Achieving user privacy in mobile networks , 1997, Proceedings 13th Annual Computer Security Applications Conference.
[5] Paul F. Syverson,et al. Unlinkable serial transactions: protocols and applications , 1999, TSEC.
[6] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[7] Hannes Federrath,et al. MIXes in Mobile Communication Systems: Location Management with Privacy , 1996, Information Hiding.
[8] Peter Reichl,et al. Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks , 1998, ESORICS.
[9] Chee Kheong Siew,et al. A secure and efficient conference scheme for mobile communications , 2003, IEEE Trans. Veh. Technol..
[10] Dieter Gollmann,et al. Computer Security — ESORICS 98 , 1998, Lecture Notes in Computer Science.
[11] Alfredo De Santis,et al. On secret set schemes , 2000, Inf. Process. Lett..
[12] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[13] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[14] Gene Tsudik,et al. Mixing E-mail with Babel , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.
[15] Birgit Pfitzmann,et al. ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead , 1991, Kommunikation in Verteilten Systemen.
[16] David A. Cooper,et al. Preserving privacy in a network of mobile computers , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[17] Gene Tsudik,et al. Secret Sets and Applications , 1998, Inf. Process. Lett..
[18] Hannes Federrath,et al. Security in Public Mobile Communication Networks , 1995 .
[19] Paul F. Syverson,et al. Protocols Using Anonymous Connections: Mobile Applications , 1997, Security Protocols Workshop.