Variable and Scalable Security: Protection of Location Information in Mobile IP (1996)

Cached

Download Links

by Andreas Fasbender , Dogan Kesdogan , Olaf Kubitz
Venue:in Mobile IP, 46th IEEE Vehicular Technology Society Conference
Citations:25 - 0 self

Documents Related by Co-Citation

1193 Untraceable electronic mail, return addresses, and digital pseudonyms – David Chaum, Communications Of The Acm, R. Rivest, David L. Chaum - 1981
162 Mixing Email with BABEL – Ceki Gülcü, Ceki Gulcu, Gene Tsudik - 1996
97 ISDN-MIXes: Untraceable Communication with Very Small Bandwidth Overhead – Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner - 1991
442 The dining cryptographers problem: Unconditional sender and recipient untraceability – David Chaum - 1988
147 Hiding Routing Information – David M. Goldschlag, Michael G. Reed, Paul F. Syverson - 1996
10 ISDN-MIXes: Untraceable communications with very small bandwidth overhead – Andreas P tzmann, Birgit P tzmann, Michael Waidner - 1991
659 Crowds: Anonymity for Web Transactions – Michael K. Reiter, Aviel D. Rubin - 1997
31 Anonymous atomic transactions – Jean Camp, Michael Harkavy, J. D. Tygar, Bennet Yee - 1996
67 How to Make Personalized Web Browsing Simple, Secure, and Anonymous – Eran Gabber, Phillip B. Gibbons, Yossi Matias, Alain Mayer - 1998
238 Anonymous connections and onion routing – Paul F. Syverson, David M. Goldschlag, Michael G. Reed - 1997
789 Wireless Ad Hoc Networks – Zygmunt J. Haas, Jing Deng, Ben Liang, Panagiotis Papadimitratos, S. Sajama - 2002
29 Anonymous communication and anonymous cash – D Simon - 1996
77 Trustee-based Tracing Extensions to Anonymous Cash and the Making of Anonymous Change – Ernie Brickell, Peter Gemmell, David Kravitz - 1995
88 Fair Exchange with a Semi-Trusted Third Party (Extended Abstract) – Matthew K. Franklin, Michael K. Reiter - 1997
15 Analysis of Security and Privacy – A Fasbender, D Kesdogan, O Kubitz - 1996
6 post to the cypherpunks mailing list – Pipenet - 1995
106 Internetworking With TCP/IP Volume 1 – D Comer - 1991
1754 How to leak a secret – Ronald L. Rivest, Adi Shamir, Yael Tauman - 2001
2453 Handbook of Applied Cryptography – Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, R. L. Rivest - 1997