關鍵字查詢 | 類別:會議論文 | | 關鍵字:Enhancing Location Privacy in Wireless Local Area Networks

[第一頁][上頁]1[次頁][最末頁]目前在第 1 頁 / 共有 02 筆查詢結果
序號 學年期 教師動態
1 97/1 電機系 莊博任 教授 會議論文 發佈 Enhancing Location Privacy in Wireless Local Area Networks , [97-1] :Enhancing Location Privacy in Wireless Local Area Networks會議論文Enhancing Location Privacy in Wireless Local Area NetworksChuang, Po-Jen; Deng, Jer-Sheng; Lin, Chih-Shin淡江大學電機工程學系Wireless local area network;Location privacy protection;Tracking approache;User-centric;Local synchronization;Independent ID update;Experimental performance evaluationProceedings of the 2008 International Computer Symposium (ICS 2008),6頁Ministry of EducationA desirable location privacy protection scheme is important for secure node communication in a wireless local area network (WLAN). By pausing transmission or updating nodes independently, a location privacy protection scheme can avoid deliberate adversary attack to prevent nodes from being tracked and transmitting information from being snapped. This paper first introduces an ID Tracking approach to show that nodes which swap IDs with other nodes in some existing location privacy protection schemes are actually easy to track. To improve the situation, i.e., t
2 96/1 電機系 莊博任 教授 會議論文 發佈 Enhancing Location Privacy in Wireless Local Area Networks , [96-1] :Enhancing Location Privacy in Wireless Local Area Networks會議論文Enhancing Location Privacy in Wireless Local Area NetworksChuang, Po-Jen; Deng, Jer-Sheng; Lin, Chih-Shin淡江大學電機工程學系Wireless local area network;Location privacy protection;Tracking approache;User-centric;Local synchronization;Independent ID update;Experimental performance evaluationProceedings of the 2008 International Computer Symposium (ICS 2008), 6p.Ministry of EducationA desirable location privacy protection scheme is important for secure node communication in a wireless local area network (WLAN). By pausing transmission or updating nodes independently, a location privacy protection scheme can avoid deliberate adversary attack to prevent nodes from being tracked and transmitting information from being snapped. This paper first introduces an ID Tracking approach to show that nodes which swap IDs with other nodes in some existing location privacy protection schemes are actually easy to track. To improve the situation, i.e.,
[第一頁][上頁]1[次頁][最末頁]目前在第 1 頁 / 共有 02 筆查詢結果