Author:
Chen Hui,Xiao Yang,Hong Xiaoyan,Hu Fei,Xie Jiang (Linda)
Subject
Computer Networks and Communications,Information Systems
Reference31 articles.
1. Asokan N. Anonymity in a mobile computing environment. Proceedings of IEEE Workshop on Mobile Computing Systems and Applications. 1994.
2. Danezis G, Diaz C. A Survey of anonymous communication channels. Microsoft Research Technical Report MSR-TR-2008-35, January 2008.
3. McCoy D, Bauer K, Grunwald D, Kohno T, Sicker D. Shining light in dark places: understanding the Tor network. Proceedings of the 8th International Symposium on Privacy Enhancing Technologies (PETS 2008), Leuven, Belgium, July 2008; 63-76.
4. Fu X, Zhu Y, Graham B, Bettati R, Zhao W. On flow marking attacks in wireless anonymous communication networks. Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS), 2005; 493-503.
5. Mutual authentication and key exchange protocols for roaming services in wireless mobile networks;Jiang;IEEE Transactions on Wireless Communications,2006
Cited by
28 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献