2004
DOI: 10.1007/978-3-540-24591-9_6
|View full text |Cite
|
Sign up to set email alerts
|

Practical Solution for Location Privacy in Mobile IPv6

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2005
2005
2013
2013

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…Currently, existing location privacy proposals for MIP can be divided in two categories [3]: a centralized trusted entity based system or a proxy based approach and a cascading overlay network based system. In the former approach, a single dedicated node is assigned as a proxy between the HA and the FA, whereas in the latter approach, n nodes are used.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Currently, existing location privacy proposals for MIP can be divided in two categories [3]: a centralized trusted entity based system or a proxy based approach and a cascading overlay network based system. In the former approach, a single dedicated node is assigned as a proxy between the HA and the FA, whereas in the latter approach, n nodes are used.…”
Section: Related Workmentioning
confidence: 99%
“…1) Information Translating Proxy (UTP): Choi et a. [3] proposed a protocol using an ITP node as an anonymous proxy. Infonnation that could relate its HA and eavesdroppers for the MN's current location is modified so that it appears to be sent from or to the lITP.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations