References
[1]. Sk.Md.M. Rahman, M. Mambo, A. Inomata, and E. Okamoto, (2006). "An Anonymous On-Demand Position- Based Routing in Mobile Ad Hoc Networks," Proc. Int'l Symp. Applications on Internet (SAINT).
[2]. Z. Zhi and Y.K. Choong, (2005). "Anonymizing Geographic Ad Hoc Routing for Preserving Location Privacy," Proc. Third Int'l Workshop Mobile Distributed Computing (ICDCSW).
[3]. V. Pathak, D. Yao, and L. Iftode, (2008). "Securing Location Aware Services over VANET Using Geographical Secure Path Routing, "Proc. IEEE Int'l Conf. Vehicular Electronics and safety (ICVES).
[4]. K.E. Defrawy and G. Tsudik, (2007). "ALARM: Anonymous Location- Aided Routing in Suspicious MANETs," Proc. IEEE Int'l Conf. Network Protocols (ICNP).
[5]. K.E. Defrawy and G. Tsudik, (2008). "PRISM: Privacy- Friendly Routing in Suspicious MANETs (and VANETs)," Proc. IEEE Int'l Conf. Network Protocols (ICNP).
[6]. Y.-C. Hu, A. Perrig, and D.B. Johnson, (2005). "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks," Wireless Networks, Vol. 11, pp. 21-38.
[7]. Aad, C. Castelluccia, and J. Hubaux, (2006). "Packet Coding for Strong Anonymity in Ad Hoc Networks," Proc. Secure comm and Workshops.
[8]. C.-C. Chou, D.S.L. Wei, C.-C. Jay Kuo, and K. Naik, (2007). "An Efficient Anonymous Communication Protocol for Peer-to-Peer Applications over Mobile Ad-Hoc Networks," IEEE J. Selected Areas in Comm., Vol. 25, No. 1, pp. 192-203.
[9]. X. Wu, (2005). "AO2P: Ad Hoc On-Demand Position- Based Private Routing Protocol," IEEE Trans. Mobile Computing, Vol. 4, No. 4, pp. 335-348.
[10]. K. El-Khatib, L. Korba, R. Song, and G. Yee, (2003). "Anonymous Secure Routing in Mobile Ad-Hoc Networks," Proc. Int'l Conf. Parallel Processing Workshops (ICPPW).
[11]. X. Wu, J. Liu, X. Hong, and E. Bertino, (2008). "Anonymous Geo- Forwarding in MANETs through Location Cloaking," IEEE Trans. Parallel and Distributed Systems, Vol. 19, No. 10, pp. 1297-1309.
[12]. J. Raymond, (2001). "Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems," Proc. Int'l Workshop Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability (WDIAU), pp. 10-29.
[13]. B. Zhu, Z. Wan, M.S. Kankanhalli, F. Bao, and R.H. Deng, (2004). "Anonymous Secure Routing in Mobile Ad- Hoc Networks," Proc. IEEE 29th Ann. Int'l Conf. Local Computer Networks (LCN).
[14]. Y.-C. Hu, D.B. Johnson, and A. Perrig, (2002). "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks," Proc. IEEE Workshop Mobile Computing Systems and Applications (WMCSA).
[15]. A.R. Beresford and F. Stajano, (2004). "Mix Zones: User Privacy in Location-Aware Services”, Proc. IEEE Second Ann. Conf. Pervasive Computing and Comm. Workshops (PERCOMW).
[16]. J. Li, J. Jannotti, D.S.J. De, C. David, R. Karger, and R. Morris, (2000). "A Scalable Location Service for Geographic Ad Hoc Routing," Proc. ACM MobiCom.