2006
DOI: 10.1016/j.jpdc.2006.04.002
|View full text |Cite
|
Sign up to set email alerts
|

Mutual anonymous overlay multicast

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2007
2007
2012
2012

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 41 publications
0
3
0
Order By: Relevance
“…In addition, it does not consider sender anonymity. MAM [13] introduces non-anonymity node into multicast and uses Onion approach to build initiator anonymity for bi-directional communication. It constructs multicast tree with non-anonymity member nodes.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, it does not consider sender anonymity. MAM [13] introduces non-anonymity node into multicast and uses Onion approach to build initiator anonymity for bi-directional communication. It constructs multicast tree with non-anonymity member nodes.…”
Section: Related Workmentioning
confidence: 99%
“…Since inherent mechanism of bus, eavesdropper does identify nothing. In addition, bus-based multicast is efficient than MAM [13] as MAM contains longer tunnel path between two anonymity member nodes, where such tunnel path at least contains two Remailers for each member node. V. CONCLUSION This paper proposes bus-based anonymous multicast.…”
Section: Anonymity Analysismentioning
confidence: 99%
“…The proliferation of RFID applications [1][2][3][4][5] raises an emerging requirement-protecting user privacy [6] in authentications. In most RFID systems, tags automatically emit their unique serial numbers upon reader interrogation without alerting their users.…”
Section: Introductionmentioning
confidence: 99%