Back to Results
First PageMeta Content
Wireless / Optimized Link State Routing Protocol / Onion routing / Dynamic Source Routing / Ad hoc On-Demand Distance Vector Routing / Link-state routing protocol / Wireless sensor network / Wireless ad-hoc network / Destination-Sequenced Distance Vector routing / Wireless networking / Routing / Technology


Mobility Changes Anonymity: Mobile Ad Hoc Networks Need Efficient Anonymous Routing ∗ Jiejun Kong† , Xiaoyan Hong‡ , M. Y. Sanadidi† , Mario Gerla† † Department of Computer Science ‡ Department of Computer
Add to Reading List

Document Date: 2007-12-26 15:31:01


Open Document

File Size: 109,11 KB

Share Result on Facebook

Company

Local Computer Networks / Mobile Ad Hoc Networks / AES / Distributed Systems / ANODR / Wireless Sensor Networks / IEEE Journal / Ad Hoc Wireless Networks / Mobile Wireless Networks / /

/

Facility

port Chaumian MIX-Net / Computer Science University of California University of Alabama Los Angeles / University of California / /

IndustryTerm

infrastructureless networking / untraceable and unobservable mobile network / public key processing delay / mobile networks / abundant network / dynamic multi-hop wireless networks / on-demand protocol / stationary sensor network / Web Transactions / fixed Internet / anonymous routing protocol / wireless traffic analysts / infrastructureless networks / proactive neighbor detection protocol / last-hop wireless networks / wireless forwarding / wireless communications / wireless transmissions / typical network / connected network / anonymity solutions / time-critical and mission-critical applications / wireless networks / /

Organization

UCLA / National Science Foundation / Department of Computer Science / University of Alabama / University of California / Los Angeles / University of California University / /

Person

Mario Gerla / /

/

Position

adversarial analyst / editor / wireless traffic analyst / mobile traffic analyst / first author / traffic analyst / /

Product

DU / /

ProvinceOrState

California / /

PublishedMedium

Communications of the ACM / Journal of Cryptology / IEEE Communications Magazine / Lecture Notes in Computer Science / /

Technology

encryption / cryptography / on-demand protocol / public key / proactive neighbor detection protocol / GPS / Mobile Computing / anonymous routing protocol / Per-hop encryption / simulation / virtual circuit / /

SocialTag