On the false-positive rate of Bloom filters, Information Processing Letters, vol.108, issue.4, pp.210-213, 2008. ,
DOI : 10.1016/j.ipl.2008.05.018
Untraceable electronic mail, return addresses, and digital pseudonyms Computing arbitrary functions of encrypted data, GRS99] David Goldschlag, Michael Reed, and Paul Syverson. Onion routing, pp.84-8897, 1981. ,
ANODR, Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing , MobiHoc '03, pp.291-302, 2003. ,
DOI : 10.1145/778415.778449
Statistically unique and cryptographically verifiable (sucv) identifiers and addresses, 20th Annual Network and Distributed System Security Symposium, 2002. ,
Anonymous topology discovery for multihop wireless sensor networks, Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks, Q2SWinet '07, pp.78-85, 2007. ,
Privacy within pervasive communications, Telecommunication Systems, vol.40, pp.101-116, 2009. ,
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Proceedings of the 17th international conference on Theory and application of cryptographic techniques, EUROCRYPT'99, pp.223-238, 1999. ,
DOI : 10.1007/3-540-48910-X_16
Cryptography from pairings : a snapshot of current research, pp.41-54, 2002. ,
Anonymity, unobservability, and pseudonymity ? a proposal for terminology Designing Privacy Enhancing Technologies Odar : On-demand anonymous routing in ad hoc networks, Mobile Adhoc and Sensor Systems (MASS) IEEE International Conference on, pp.1-9, 2001. ,
MASK: anonymous on-demand routing in mobile ad hoc networks, IEEE Transactions on Wireless Communications, vol.5, issue.9, pp.2376-2385, 2006. ,
DOI : 10.1109/TWC.2006.1687761