A Comprehensive Survey
Author:
Ma Yuxiang, Wu YuleiORCID, Ge Jingguo
Publisher
Springer Singapore
Reference52 articles.
1. Andersen DG, Balakrishnan H, Feamster N, Koponen T, Moon D, Shenker S (2008) Accountable internet protocol (AIP). In: Proceedings of the ACM SIGCOMM conference (SIGCOMM). ACM, pp 339–350 2. Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. In: Proceedings of the USENIX security symposium. USENIX 3. Hao F, Li S, Min G, Kim HC, Yau SS, Yang LT (2015) An efficient approach to generating location-sensitive recommendations in ad-hoc social network environments. IEEE Trans Serv Comput 8(3):520–533 4. Hsiao HC, Kim THJ, Perrig A, Yamada A, Nelson SC, Gruteser M, Meng W (2012) LAP: lightweight anonymity and privacy. In: IEEE symposium on security and privacy. IEEE, pp 506–520 5. Hummen R, Wirtz H, Ziegeldorf JH, Hiller J, Wehrle K (2013) Tailoring end-to-end IP security protocols to the internet of things. In: IEEE international conference on network protocols (ICNP). IEEE, pp 1–10
|
|