Author of the publication

Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless Networks.

, , and . GLOBECOM, page 49-53. IEEE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SALS: semantics-aware location sharing based on cloaking zone in mobile social networks., , , and . MobiGIS, page 49-56. ACM, (2012)Scalable ad hoc routing in large, dense wireless networks using clustering and landmarks., , , , and . ICC, page 3179-3185. IEEE, (2002)A new clustering approach and its application to BBL placement., , , , , and . EURO-DAC, page 665-669. IEEE Computer Society, (1990)C-ICAMA, a centralized intelligent channel assigned multiple access for multi-layer ad-hoc wireless networks with UAVs., , , , , and . WCNC, page 879-884. IEEE, (2000)Experimental evaluation of LANMAR, a scalable ad-hoc routing protocol., , , , , and . WCNC, page 2032-2037. IEEE, (2005)Secure Relative Location Determination in Vehicular Network., , and . MSN, volume 4325 of Lecture Notes in Computer Science, page 543-554. Springer, (2006)Privacy-preserving secure relative localization in vehicular networks., , and . Secur. Commun. Networks, 1 (3): 195-204 (2008)Scalable Team Multicast in Wireless Ad hoc Networks Exploiting Coordinated Motion., , and . Networked Group Communication, page 97-104. ACM, (2002)An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks., , and . IEEE Trans. Mob. Comput., 6 (8): 888-902 (2007)Recent advances in mobility modeling for mobile ad hoc network research., , and . ACM Southeast Regional Conference, page 70-75. ACM, (2004)