Sciweavers

TPDS
2008
231views more  TPDS 2008»
13 years 4 months ago
Anonymous Geo-Forwarding in MANETs through Location Cloaking
In this paper, we address the problem of destination anonymity for applications in mobile ad hoc networks where geographic information is ready for use in both ad hoc routing and I...
Xiaoxin Wu, Jun Liu, Xiaoyan Hong, Elisa Bertino
ENTCS
2007
89views more  ENTCS 2007»
13 years 4 months ago
Weak Probabilistic Anonymity
Abstract. Anonymity means that the identity of the user performing a certain action is maintained secret. The protocols for ensuring anonymity often use random mechanisms which can...
Yuxin Deng, Catuscia Palamidessi, Jun Pang
JPDC
2006
105views more  JPDC 2006»
13 years 4 months ago
Mutual anonymous overlay multicast
Multicast services are demanded by a variety of applications. Many applications require anonymity during their communication. However, there has been very little work on anonymous...
Li Xiao, Yunhao Liu, Wenjun Gu, Dong Xuan, Xiaomei...
JSW
2008
89views more  JSW 2008»
13 years 4 months ago
Secure Set Union and Bag Union Computation for Guaranteeing Anonymity of Distrustful Participants
Abstract-- The computation of the union operator for different distributed datasets involves two challenges when participants are curious and can even act malicious: guaranteeing a...
Stefan Böttcher, Sebastian Obermeier
CORR
2007
Springer
124views Education» more  CORR 2007»
13 years 4 months ago
Anonymous Networking amidst Eavesdroppers
—The problem of security against packet timing based traffic analysis in wireless networks is considered in this work. An analytical measure of “anonymity” of routes in eave...
Parvathinathan Venkitasubramaniam, Ting He, Lang T...
IJSNET
2006
106views more  IJSNET 2006»
13 years 4 months ago
Efficient anonymity schemes for clustered wireless sensor networks
: In this paper, we propose two simple and efficient schemes for establishing anonymity in Clustered Wireless Sensor Networks (CWSNs). The first scheme Simple Anonymity Scheme (SAS...
Satyajayant Misra, Guoliang Xue
IJNSEC
2006
78views more  IJNSEC 2006»
13 years 4 months ago
Authentication and Key Agreement Protocols Preserving Anonymity
Anonymity is a very important security feature in addition to authentication and key agreement features in communication protocols. In this paper, we propose two authentication an...
Kumar V. Mangipudi, Rajendra S. Katti, Huirong Fu
CCR
2007
90views more  CCR 2007»
13 years 4 months ago
You must be joking... warns you: don't drink and type
I would like to apologise to both of my fans (which I will call Tom and Jerry respecting their request for anonymity for obvious reasons) for missing my column in the last issue. ...
Michalis Faloutsos
ENTCS
2006
134views more  ENTCS 2006»
13 years 4 months ago
Anonymity in Probabilistic and Nondeterministic Systems
Anonymity means that the identity of the user performing a certain action is maintained secret. The protocols for ensuring anonymity often use random mechanisms which can be descr...
Catuscia Palamidessi
ENTCS
2006
117views more  ENTCS 2006»
13 years 4 months ago
Probabilistic and Nondeterministic Aspects of Anonymity
Anonymity means that the identity of the user performing a certain action is maintained secret. The protocols for ensuring anonymity often use random mechanisms which can be descr...
Catuscia Palamidessi