Home > Research > Browse

Results for source location privacy

Publications & Outputs

  1. Phantom walkabouts: A customisable source location privacy aware routing protocol for wireless sensor networks

    Gu, C., Bradbury, M. & Jhumka, A., 25/10/2019, In: Concurrency and Computation: Practice and Experience. 31, 20, 17 p., e5304.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Deconstructing Source Location Privacy-aware Routing Protocols

    Jhumka, A. & Bradbury, M., 1/04/2017, Proceedings of the Symposium on Applied Computing. Marrakech, Morocco : ACM, p. 431-436 6 p. (SAC'17).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Phantom Walkabouts in Wireless Sensor Networks

    Gu, C., Bradbury, M. & Jhumka, A., 1/04/2017, SAC '17: Proceedings of the Symposium on Applied Computing. Marrakech, Morocco: ACM, p. 609-616 8 p. (SAC'17).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Fake source-based source location privacy in wireless sensor networks

    Jhumka, A., Bradbury, M. & Leeke, M., 25/08/2015, In: Concurrency and Computation: Practice and Experience. 27, 12, p. 2999-3020 22 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review