UM

Browse/Search Results:  1-2 of 2 Help

Selected(0)Clear Items/Page:    Sort:
Pseudonym inference in cooperative vehicular traffic scenarios Conference paper
Chu X., Ruan N., Li M., Jia W.. Pseudonym inference in cooperative vehicular traffic scenarios[C], 2018.
Authors:  Chu X.;  Ruan N.;  Li M.;  Jia W.
Favorite | TC[WOS]:0 TC[Scopus]:1 | Submit date:2019/04/04
Location Privacy  Mix-zone  Vehicle Platoon  Vehicular Ad-hoc Networks (Vanets)  
Protocol-level attacks against Tor Journal article
Ling Z., Luo J., Yu W., Fu X., Jia W., Zhao W.. Protocol-level attacks against Tor[J]. Computer Networks, 2013, 57(4), 869-886.
Authors:  Ling Z.;  Luo J.;  Yu W.;  Fu X.;  Jia W.; et al.
Favorite | TC[WOS]:19 TC[Scopus]:30  IF:4.4/4.4 | Submit date:2019/02/11
Anonymity  Mix Networks  Protocol-level Attacks  Tor