Computer Science ›› 2014, Vol. 41 ›› Issue (10): 177-183.doi: 10.11896/j.issn.1002-137X.2014.10.040
Previous Articles Next Articles
ZHANG Zhong-ke and WANG Yun
[1] Kong J,Hong X.ANODR:Anonymous on Demand Routingwith Untraceable routes for Mobile Ad-hoc Networks[C]∥Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing (MOBIHOC’03).2003:291-302 [2] Zhang Y,Liu W.MASK:Anonymous On-demand Routing inMobile Ad Hoc Networks[J].IEEE Transactions on Wireless Communications,2006,5(9):2376-2385 [3] Pongaliu K,Xiao L.Maintaining Source Privacy under Eaves-dropping and Node Compromise Attacks[C]∥Proceedings of the 30th IEEE International Conference on Computer Communications(INFOCOM’11).2008:1656-1664 [4] Liu J,Hong X,Kong J,et al.A Hierarchical anonymous Routing Scheme for Mobile Ad-Hoc Networks[C]∥Proceedings of the 2006 IEEE conference on Military communications (MILCOM’06).2006:2310-2316 [5] Zhang R,Zhang Y,Fang Y.AOS:An Anonymous Overlay System for Mobile.Ad hoc Networks[J].Wireless Networks,2011,17(4):843-859 [6] Nguyen A,Milosavljevic N,Fang Q,et al.Landmark Selection and Greedy Landmark-descent Routing for Sensor Networks[C]∥Proceedings of the 26th IEEE Conference on Computer Communications(INFOCOM’ 07).2007:661-669 [7] Shao M,Hu W.Cross-layer Enhanced Source Location Privacy in Sensor Networks[C]∥Proceedings of IEEE Conference on Sensor,Mesh & Ad Hoc Communication Networks (SECON’09).2009:1-9 [8] Wang H D,Sheng B,Li Q.Privacy-aware Routing in SensorNetworks[J].Computer Networks,2009,53(9):1512-1529 [9] Wang H,Sheng B,Tan C,et al.WM-ECC:an elliptic curve cryptography suite on sensor motes [R].Technical Report WM-CS-2007-11.CS Department,College of William and Mary,2007:1-14 [10] Oliveira L,Aranha D,Gouvêa C,et al.TinyPBC:Pairings for authenticated identity-based non-interactive key distribution in sensor networks [J].Computer Communications,2011,34(3):485-493 [11] Szczechowiak P,Kargl A,Scott M,et al.On the application of pairing based cryptography to wireless sensor networks[C]∥Proceedings of the 2nd ACM Conference on Wireless Network Security(WISEC’09).2009:1-12 [12] Ganesan P,Venugopalan R,Peddabachagari P,et al.Analyzing and modeling encryption overhead for sensor network nodes[C]∥Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications(WSNA’03).2003:151-159 |
No related articles found! |
|