[[abstract]]In recent years, several anonymous routing protocols for wireless ad hoc networks have been proposed. In 2007, Lu, Cao, Wang, and Sun proposed a secure routing protocol with anonymity property and key exchange for ad hoc networks. However, in this paper, it is demonstrated that the so-called secure, anonymous key exchange protocol introduced by Lu et al. is vulnerable to a passive attack and, as a result, the anonymity property of the protocol may be compromised. A simple improvement is suggested to eliminate the vulnerabilit
[[abstract]]This paper proposes an efficient anonymous routing protocol for mobile ad hoc networks (...
In wireless ad-hoc networks, malicious nodes can constitute a threat to the security and/or anonymit...
Introducing node mobility into the network also intro-duces new anonymity threats. Nevertheless, thi...
[[abstract]]More attention should be paid to anonymous routing protocols in secure wireless ad hoc n...
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Commun...
Abstract — In this paper, we first define the requirements on anonymity and security properties of t...
Mobile Ad hoc Network is stated as a cluster that contains Digital data terminals and they are furni...
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Commun...
Abstract—Providing security and anonymity to users are critical in wireless ad hoc networks. In this...
Abstract—The currently proposed anonymous routing mech-anisms for Mobile Ad hoc Networks enable netw...
Abstract—Providing anonymous routing in mobile ad hoc networks (MANET) has been a hot issue for the ...
Privacy and Security have emerged as an important research issue in Mobile Ad Hoc Networks (MANET) d...
Privacy and Security have emerged as an important research issue in Mobile Ad Hoc Networks (MANET) d...
Mobility changes anonymity: new passive threats in mobile ad hoc networks Privacy in mobile ad hoc n...
Privacy in mobile ad hoc networks has new semantics in addition tothe conventional notions for infra...
[[abstract]]This paper proposes an efficient anonymous routing protocol for mobile ad hoc networks (...
In wireless ad-hoc networks, malicious nodes can constitute a threat to the security and/or anonymit...
Introducing node mobility into the network also intro-duces new anonymity threats. Nevertheless, thi...
[[abstract]]More attention should be paid to anonymous routing protocols in secure wireless ad hoc n...
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Commun...
Abstract — In this paper, we first define the requirements on anonymity and security properties of t...
Mobile Ad hoc Network is stated as a cluster that contains Digital data terminals and they are furni...
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Commun...
Abstract—Providing security and anonymity to users are critical in wireless ad hoc networks. In this...
Abstract—The currently proposed anonymous routing mech-anisms for Mobile Ad hoc Networks enable netw...
Abstract—Providing anonymous routing in mobile ad hoc networks (MANET) has been a hot issue for the ...
Privacy and Security have emerged as an important research issue in Mobile Ad Hoc Networks (MANET) d...
Privacy and Security have emerged as an important research issue in Mobile Ad Hoc Networks (MANET) d...
Mobility changes anonymity: new passive threats in mobile ad hoc networks Privacy in mobile ad hoc n...
Privacy in mobile ad hoc networks has new semantics in addition tothe conventional notions for infra...
[[abstract]]This paper proposes an efficient anonymous routing protocol for mobile ad hoc networks (...
In wireless ad-hoc networks, malicious nodes can constitute a threat to the security and/or anonymit...
Introducing node mobility into the network also intro-duces new anonymity threats. Nevertheless, thi...