Efficient dispersal of information for security, load balancing, and fault tolerance
Journal of the ACM (JACM)
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Elliptic curves in cryptography
Elliptic curves in cryptography
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Elliptic Curve Public Key Cryptosystems
Elliptic Curve Public Key Cryptosystems
When Peer-to-Peer comes Face-to-Face: Collaborative Peer-to-Peer Computing in Mobile Ad hoc Networks
P2P '01 Proceedings of the First International Conference on Peer-to-Peer Computing
Peer-to-peer File-sharing over Mobile Ad hoc Networks
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
A cross-layer optimization of gnutella for mobile ad hoc networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Searching Local Information in Mobile Databases
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
Search-and-Discover in Mobile P2P Network Databases
ICDCS '06 Proceedings of the 26th IEEE International Conference on Distributed Computing Systems
Mutual Anonymity for Mobile P2P Systems
IEEE Transactions on Parallel and Distributed Systems
IEEE Journal on Selected Areas in Communications
Wireless telemedicine and m-health: technologies, applications and research issues
International Journal of Sensor Networks
A survey of security visualization for computer network logs
Security and Communication Networks
Security and Communication Networks
An efficient anonymous communication protocol for wireless sensor networks
Wireless Communications & Mobile Computing
Hi-index | 0.00 |
A mobile peer-to-peer network (MOPNET) has drawn increasing attentions for its communication convenience and ease of resource sharing in an unfixed infrastructure. The essential requirements for applications in a MOPNET are to enforce trust of transmitted data and security of peers. However, most of mutual anonymity protocols for a MOPNET lack integrity protection, and hence, any peer might suffer from some potential security threats such as virus-infected or Trojan horse files. This paper proposes a mutual anonymity protocol with integrity protection for a MOPNET, in which the initiator and responder anonymously share data with each other, and ensure its integrity.