ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs
暂无分享,去创建一个
[1] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[2] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[3] Paul F. Syverson,et al. Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..
[4] B. Bhattacharjee,et al. A Protocol for Scalable Anonymous Communication , 1999 .
[5] Xiaoyan Hong,et al. A group mobility model for ad hoc wireless networks , 1999, MSWiM '99.
[6] David R. Karger,et al. A scalable location service for geographic ad hoc routing , 2000, MobiCom '00.
[7] Ian Clarke,et al. Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[8] Jean-François Raymond,et al. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[9] Klara Nahrstedt,et al. A scalable location management scheme in mobile ad-hoc networks , 2001, Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks.
[10] Ran Canetti,et al. Efficient and Secure Source Authentication for Multicast , 2001, NDSS.
[11] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[12] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[13] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[14] Imed Bouazizi,et al. ARA-the ant-colony based routing algorithm for MANETs , 2002, Proceedings. International Conference on Parallel Processing Workshop.
[15] Tracy Camp,et al. A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..
[16] Deborah Estrin,et al. Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table , 2003, Mob. Networks Appl..
[17] Srivaths Ravi,et al. Analyzing the energy consumption of security protocols , 2003, ISLPED '03.
[18] Mohan S. Kankanhalli,et al. Anonymous secure routing in mobile ad-hoc networks , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[19] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[20] Frank Stajano,et al. Mix zones: user privacy in location-aware services , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[21] Bharat K. Bhargava,et al. AO2P: ad hoc on-demand position-based private routing protocol , 2005, IEEE Transactions on Mobile Computing.
[22] A. Pfitzmann. Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management-A Consolidated Proposal for Terminology, Version v0.26 , 2005 .
[23] Wenjing Lou,et al. Anonymous communications in mobile ad hoc networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[24] Zhi Zhou,et al. Anonymizing geographic ad hoc routing for preserving location privacy , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.
[25] Aravind Srinivasan,et al. P/sup 5/ : a protocol for scalable anonymous communication , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[26] Tom Chothia,et al. A Survey of Anonymous Peer-to-Peer File-Sharing , 2005, EUC Workshops.
[27] Markus Jakobsson,et al. Discount Anonymous On Demand Routing for Mobile Ad hoc Networks , 2006, 2006 Securecomm and Workshops.
[28] Claude Castelluccia,et al. Packet Coding for Strong Anonymity in Ad Hoc Networks , 2006, 2006 Securecomm and Workshops.
[29] Xiaoxin Wu. DISPOSER: distributed secure position service in mobile ad hoc networks , 2006, Wirel. Commun. Mob. Comput..
[30] Eiji Okamoto,et al. An anonymous on-demand position-based routing in mobile ad hoc networks , 2006, International Symposium on Applications and the Internet (SAINT'06).
[31] Ivan Stojmenovic,et al. On delivery guarantees of face and combined greedy-face routing in ad hoc and sensor networks , 2006, MobiCom '06.
[32] Uichin Lee,et al. Enhanced Perimeter Routing for Geographic Forwarding Protocols in Urban Vehicular Scenarios , 2007, 2007 IEEE Globecom Workshops.
[33] Sagar Naik,et al. An efficient anonymous communication protocol for peer-to-peer applications over mobile ad-hoc networks , 2007, IEEE Journal on Selected Areas in Communications.
[34] Elisa Bertino,et al. Anonymous Geo-Forwarding in MANETs through Location Cloaking , 2008, IEEE Transactions on Parallel and Distributed Systems.
[35] Danfeng Yao,et al. Securing location aware services over VANET using geographical secure path routing , 2008, 2008 IEEE International Conference on Vehicular Electronics and Safety.
[36] Gene Tsudik,et al. PRISM: Privacy-friendly routing in suspicious MANETs (and VANETs) , 2008, 2008 IEEE International Conference on Network Protocols.
[37] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[38] Haiying Shen,et al. ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs , 2011, ICPP.
[39] Gene Tsudik,et al. ALARM: Anonymous Location-Aided Routing in Suspicious MANETs , 2007, IEEE Transactions on Mobile Computing.