Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
anonymous routing
biblio
Securing Network-on-Chips via Novel Anonymous Routing
Submitted by grigby1 on Tue, 03/01/2022 - 3:18pm
Proposals
Trojan horses
system-on-chips
Source Routing
security
Scalability
Routing
Resiliency
resilience
pubcrawl
anonymous routing
Network-on-Chips
network-on-chip
network on chip security
Metrics
hardware trojan
Hardware
Cryptography
Costs
composability
biblio
Extending Routes in Tor to Achieve Recipient Anonymity against the Global Adversary
Submitted by grigby1 on Wed, 02/09/2022 - 1:49pm
Numerical models
anonymity
anonymous routing
Censorship resistance
composability
Costs
encryption
Human behavior
Metrics
Topology
overlay networks
privacy
pubcrawl
resilience
Resiliency
Routing
Routing protocols
biblio
Anonymous Routing Protocols in MANETs, a Security Comparative Analysis
Submitted by grigby1 on Thu, 10/29/2020 - 10:58am
mobile ad hoc networks
telecommunication security
special type
self organized fashion
security comparative analysis
Routing protocols
Routing
Resiliency
resilience
pubcrawl
private routing protocols
privacy
performance capabilities
mobile computing
Ad hoc networks
mobile ad hoc network
military environments ones
Metrics
MANETs
manet privacy
MANET
fixed infrastructure
Cryptography
Compositionality
communication secrecy
civil environments ones
anonymous routing protocols
anonymous routing
biblio
Self-Healing Anonymous Routing in Unstable Sensor Networks
Submitted by grigby1 on Mon, 02/17/2020 - 4:11pm
anonymous routing
composability
Homomorphic encryption
limited deanonymization
pubcrawl
resilience
Resiliency
security
self-healing networks
sensor networks
biblio
An Anonymous Routing Scheme for Preserving Location Privacy in Wireless Sensor Networks
Submitted by grigby1 on Mon, 12/16/2019 - 2:53pm
routing branch
location security
privacy
proxy source node
pubcrawl
Receivers
resilience
Resiliency
Routing
location privacy
Scalability
security
synchronisation
telecommunication network routing
telecommunication security
telecommunication traffic
traffic consumption
wireless sensor networks
Control Theory
Metrics
Location Privacy in Wireless Networks
anonymous routing
anonymous routing strategy for preserving location privacy
ARPLP
base station
Base stations
communication delay
Compositionality
cryptography theory
Cyber Physical System
cyber physical systems
data privacy
energy consumption
Energy Efficiency
Human behavior
location information
biblio
Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography
Submitted by grigby1 on Tue, 12/12/2017 - 12:25pm
law enforcement
telecommunication traffic
telecommunication network routing
streaming design
source anonymity
Secure Processing
Scalability
Resiliency
public key cryptography
pubcrawl
Protocols
Peer-to-peer computing
Metrics
Light-weight
anonymous data sharing
Internet traffic
internet
Information Leakage
encryption
encrypted search capabilities
Elliptic curve cryptography
destination anonymity
data sharing
computer network security
circuit creation
Ciphers
anonymous routing
biblio
AASR: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments
Submitted by Anonymous on Mon, 12/07/2015 - 3:40pm
mobile ad hoc networks
telecommunication traffic
telecommunication security
secret verification message routing
Routing protocols
Routing
Public key
onion routing
mobile nodes
mobile computing
Mobile ad hoc networks (MANETs)
AASR protocol
MANET
key-encrypted onion routing
fake routing packets
denial-of-service broadcasting
Cryptographic Protocols
authenticated routing
authenticated anonymous secure routing protocols
anonymous routing
adversarial environments
Ad hoc networks
biblio
Anonymous and Secure Communication Protocol for Cognitive Radio Ad Hoc Networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:14pm
network throughput
wireless communication media
telecommunication security
spectrum sensing
spectrum resource scarcity
spectrum allocation
source node
security aspect
secure communication
secure anonymous routing
Routing protocols
Routing
Protocols
privacy
pairing-based cryptography
operational aspect
Ad hoc networks
location anonymity
Energy Efficiency
end-to-end delay
disaster recovery communication network
destination node
Cryptography
Cryptographic Protocols
CRAN
CR media
CR ad hoc networks
cognitive radio ad hoc networks
cognitive radio (CR) networks
cognitive radio
anonymous-secure communication protocol
anonymous routing
biblio
Anonymity, unlinkability and unobservability in mobile ad hoc networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:13pm
telecommunication network topology
public-private key pairs
route discovery process
Routing
Routing protocols
routing schemes
secure communications
security
security attacks
public key cryptography
telecommunication security
unlinkability
unobservability
user privacy
USOR
wired networks
Wireless communication
Ad hoc networks
private key cryptography
ns2
mobile ad hoc networks
ID based encryption scheme
group signature scheme
dynamic topology
cryptosystems
Cryptography
cooperative communication
cooperative algorithms
Communication system security
centralized monitoring
AODV
anonymous routing
anonymity