4.6 Article

DPMM: dynamic pseudonym-based multiple mix-zones generation for mobile traveler

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography

Yanrong Lu et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2017)

Article Computer Science, Information Systems

Analysis of interaction trace maps for active authentication on smart devices

Jamil Ahmad et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2017)

Article Computer Science, Information Systems

GEO matching regions: multiple regions of interests using content based image retrieval based on relative locations

Muhammad Hammad Memon et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2017)

Article Computer Science, Information Systems

Dynamic path privacy protection framework for continuous query service over road networks

Imran Memon et al.

WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS (2017)

Article Computer Science, Information Systems

A learning-based comprehensive evaluation model for traffic data quality in intelligent transportation systems

Yidong Li et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2016)

Article Computer Science, Information Systems

INSIGMA: an intelligent transportation system for urban mobility enhancement

Wojciech Chmiel et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2016)

Article Computer Science, Information Systems

A traffic anomaly detection approach in communication networks for applications of multimedia medical devices

Dingde Jiang et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2016)

Article Computer Science, Information Systems

QoS constraints-based energy-efficient model in cloud computing networks for multimedia clinical issues

Dingde Jiang et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2016)

Article Computer Science, Information Systems

An efficient anonymous authentication protocol using batch operations for VANETs

Yawei Liu et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2016)

Article Computer Science, Information Systems

Mobile context-based framework for threat monitoring in urban environment with social threat monitor

Szymon Bobek et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2016)

Article Computer Science, Information Systems

Recommending multimedia visiting paths in cultural heritage applications

Ilaria Bartolini et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2016)

Article Computer Science, Information Systems

Designing a mobile language learning system based on lightweight learning objects

Milos Milutinovic et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2015)

Article Computer Science, Information Systems

A context-aware mobile web middleware for service of surveillance video with privacy

Jie Shen et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2015)

Article Computer Science, Information Systems

New detection method and countermeasure of cyber attacks in mix networks

Kwang Cheol Park et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2015)

Article Computer Science, Information Systems

Location privacy and public metadata in social media platforms: attitudes, behaviors and opinions

Marco Furini et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2015)

Article Telecommunications

Architecture of Hybrid Mobile Social Networks for Efficient Content Delivery

Rizwan Akhtar et al.

WIRELESS PERSONAL COMMUNICATIONS (2015)

Article Telecommunications

Travel Recommendation Using Geo-tagged Photos in Social Media for Tourist

Imran Memon et al.

WIRELESS PERSONAL COMMUNICATIONS (2015)

Article Computer Science, Information Systems

Mix-zones optimal deployment for protecting location privacy in VANET

Yipin Sun et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2015)

Letter Telecommunications

Multi-scale anomaly detection for high-speed network traffic

Dingde Jiang et al.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2015)

Article Computer Science, Information Systems

VANET security surveys

Richard Gilles Engoulou et al.

COMPUTER COMMUNICATIONS (2014)

Article Computer Science, Theory & Methods

Chameleon Hashing for Secure and Privacy-Preserving Vehicular Communications

Song Guo et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Computer Science, Hardware & Architecture

A transform domain-based anomaly detection approach to network-wide traffic

Dingde Jiang et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2014)

Article Computer Science, Information Systems

W3-privacy: understanding what, when, and where inference channels in multi-camera surveillance video

Mukesh Saini et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2014)

Article Computer Science, Information Systems

Using transcoding for hidden communication in IP telephony

Wojciech Mazurczyk et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2014)

Article Telecommunications

Dynamic Mix-Zone for Location Privacy in Vehicular Networks

Bidi Ying et al.

IEEE COMMUNICATIONS LETTERS (2013)

Article Computer Science, Hardware & Architecture

Non-Cooperative Location Privacy

Julien Freudiger et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2013)

Article Computer Science, Hardware & Architecture

Cooperative pseudonym change scheme based on the number of neighbors in VANETs

Yuanyuan Pan et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)

Proceedings Paper Engineering, Electrical & Electronic

Efficient Pseudonym Changing Schemes for Location Privacy Protection in VANETs

Yeong-Sheng Chen et al.

2013 INTERNATIONAL CONFERENCE ON CONNECTED VEHICLES AND EXPO (ICCVE) (2013)

Proceedings Paper Computer Science, Hardware & Architecture

Protocol of Change Pseudonyms for VANETs

Adetundji Adigun et al.

PROCEEDINGS OF THE 2013 38TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS WORKSHOPS (LCN WORKSHOPS) (2013)

Article Engineering, Electrical & Electronic

Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs

Rongxing Lu et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2012)

Article Computer Science, Hardware & Architecture

Joint time-frequency sparse estimation of large-scale network traffic

Dingde Jiang et al.

COMPUTER NETWORKS (2011)

Article Computer Science, Information Systems

A survey and comparative study of simulators for vehicular ad hoc networks (VANETs)

Francisco J. Martinez et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2011)

Article Engineering, Electrical & Electronic

An optimization method of large-scale IP traffic matrix estimation

Dingde Jiang et al.

AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS (2010)

Article Computer Science, Information Systems

Mobility Models for Vehicular Ad Hoc Networks: A Survey and Taxonomy

Jerome Haerri et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2009)

Article Computer Science, Information Systems

INTER-VEHICLE COMMUNICATION SYSTEMS: A SURVEY

Mihail L. Sichitiu et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2008)

Article Computer Science, Hardware & Architecture

Impact of denial of service attacks on ad hoc networks

Imad Aad et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2008)

Article Computer Science, Information Systems

Location privacy in pervasive computing

AR Beresford et al.

IEEE PERVASIVE COMPUTING (2003)