Maintaining source privacy under eavesdropping and node compromise attacks | IEEE Conference Publication | IEEE Xplore