2005
DOI: 10.1007/11499169_33
|View full text |Cite
|
Sign up to set email alerts
|

Privacy and Reliability by Dispersive Routing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2006
2006
2009
2009

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 2 publications
0
8
0
Order By: Relevance
“…We base the proof on the following claim that is also used in the proof of Theorem 8: The detailed proofs of Theorem 7 and Claim 1 are omitted and can be found in [27].…”
Section: Theoremmentioning
confidence: 99%
See 4 more Smart Citations
“…We base the proof on the following claim that is also used in the proof of Theorem 8: The detailed proofs of Theorem 7 and Claim 1 are omitted and can be found in [27].…”
Section: Theoremmentioning
confidence: 99%
“…For that reason and for a better understanding of the problem, we have formulated the attacker problem as a linear programming problem. Due to lack of space we omit the details of the formulation and present them in [27]. This formulation can be used to solve the attacker problem by a Linear Programming (LP) solver.…”
Section: A Brief Description Of the Problemmentioning
confidence: 99%
See 3 more Smart Citations