메뉴 건너뛰기




Volumn , Issue , 2006, Pages

LAAC: A location-aware access control protocol

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS POINTS; INTERNATIONAL CONFERENCES; LOCATION AREA; LOCATION-AWARE ACCESS CONTROL PROTOCOL; LOCATION-AWARE SYSTEMS; MEMORY REQUIREMENTS; MOBILE COMPUTING DEVICES; MULTIPLE ACCESS POINTS; SIMULATION RESULTS; UBIQUITOUS SYSTEMS; WIRELESS COMMUNICATION TECHNOLOGIES;

EID: 50249168194     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MOBIQW.2006.361757     Document Type: Conference Paper
Times cited : (7)

References (32)
  • 1
    • 50249150186 scopus 로고    scopus 로고
    • IEEE Std 802.11. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Technical report, IEEE, 1999.
    • IEEE Std 802.11. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Technical report, IEEE, 1999.
  • 2
    • 50249159437 scopus 로고    scopus 로고
    • June, Available at
    • RSA SecureID. June 2003. Available at http://rsasecurity.agora.com/ rsasecured/guides/imp.pdfs/adtraaace5.pdf.
    • (2003)
    • SecureID, R.S.A.1
  • 4
    • 50249155813 scopus 로고    scopus 로고
    • B. Waters and E. Felten. Proving the Location of Tamper Resistant Devices. Technical report, Princeton University
    • B. Waters and E. Felten. Proving the Location of Tamper Resistant Devices. Technical report, Princeton University.
  • 6
    • 50249096161 scopus 로고    scopus 로고
    • Network Security: Private Communication in a PUBLIC World. Prentice Hall, 2002
    • C. Kaufman, R. Perlman and M. Speciner. Network Security: Private Communication in a PUBLIC World. Prentice Hall, 2002.
    • Kaufman, C.1    Perlman, R.2    Speciner, M.3
  • 7
    • 0037623983 scopus 로고    scopus 로고
    • Identify-based encryption from the weilpairing
    • D. Boneh and M. Franklin. Identify-based encryption from the weilpairing. SIAM Journal of Computing, 32(3):586-615, 2003.
    • (2003) SIAM Journal of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 10
    • 34247582486 scopus 로고    scopus 로고
    • Available at
    • H. Tyan. J-Sim. Available at http://www.j-sim.org/.
    • J-Sim
    • Tyan, H.1
  • 12
    • 4544304744 scopus 로고    scopus 로고
    • The Sybil Attack
    • Cambridge, MA, USA, March
    • J. Douceur. The Sybil Attack. In Proceedings of IPTPS 2002, Cambridge, MA, USA, March 2002.
    • (2002) Proceedings of IPTPS 2002
    • Douceur, J.1
  • 13
    • 50249179617 scopus 로고    scopus 로고
    • J. Hightower and G. Bordello. Location Systems for Ubiquitos Computing, August 2001. IEEE Computer Magazine.
    • J. Hightower and G. Bordello. Location Systems for Ubiquitos Computing, August 2001. IEEE Computer Magazine.
  • 14
    • 50249184664 scopus 로고    scopus 로고
    • J. Kohl and B. C. Neuman. The Kerberos Network Authentication Service (Version 5), September 1993. Internet Request for Comments RFC-1510.
    • J. Kohl and B. C. Neuman. The Kerberos Network Authentication Service (Version 5), September 1993. Internet Request for Comments RFC-1510.
  • 15
    • 3042785862 scopus 로고    scopus 로고
    • The Sybil Attack in Sensor Networks: Analysis and Defenses
    • Berkeley, CA, April
    • J. Newsome, E. Shi, D. Song and A. Perrig. The Sybil Attack in Sensor Networks: Analysis and Defenses. In Proceedings of IPSN 2004, Berkeley, CA, April 2004.
    • (2004) Proceedings of IPSN 2004
    • Newsome, J.1    Shi, E.2    Song, D.3    Perrig, A.4
  • 18
    • 27544485427 scopus 로고    scopus 로고
    • Leap-Frog Packet Linking and Diverse Key Distributions for Improved Integrity in Network Broadcasts
    • M.T. Goodrich. Leap-Frog Packet Linking and Diverse Key Distributions for Improved Integrity in Network Broadcasts. In IEEE Symposium on Security and Privacy (SSP), pages 196-207, 2005.
    • (2005) IEEE Symposium on Security and Privacy (SSP) , pp. 196-207
    • Goodrich, M.T.1
  • 21
    • 2942590111 scopus 로고    scopus 로고
    • PAC: Location Aware Access Control for Pervasive Computing Environments
    • Technical report, MIT Laboratory of Computer Science, 200 Technology Square, Cambridge MA, 02139 USA
    • N. Michalakis. PAC: Location Aware Access Control for Pervasive Computing Environments. Technical report, MIT Laboratory of Computer Science, 200 Technology Square, Cambridge MA, 02139 USA, 2002.
    • (2002)
    • Michalakis, N.1
  • 23
    • 0036949534 scopus 로고    scopus 로고
    • Energy-Efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with ZebraNet
    • San Jose, CA, October
    • P. Juang, H. Oki, Y. Wang, M. Martonosi, L. Peh, and D. Rubenstein. Energy-Efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with ZebraNet. In ASPLOS-X, San Jose, CA, October 2002.
    • (2002) ASPLOS-X
    • Juang, P.1    Oki, H.2    Wang, Y.3    Martonosi, M.4    Peh, L.5    Rubenstein, D.6
  • 25
    • 84937428623 scopus 로고    scopus 로고
    • P. S. L. M. Barreto, H. Kim, B. Bynn, and M. Scott. Efficient Algorithms for Pairing-Based Cryptosystems. Advances in Cryptology - Crypto 2002, Lecture Notes on Computer Science 2442:354-368, 2002.
    • P. S. L. M. Barreto, H. Kim, B. Bynn, and M. Scott. Efficient Algorithms for Pairing-Based Cryptosystems. Advances in Cryptology - Crypto 2002, Lecture Notes on Computer Science 2442:354-368, 2002.
  • 27
    • 0018048246 scopus 로고
    • Using Encryption for Authentication in Large Networks of Computers
    • December
    • R. M. Needham and M. D. Schroeder. Using Encryption for Authentication in Large Networks of Computers. In Communication of the ACM, pages 993-999, December 1978.
    • (1978) Communication of the ACM , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 28
    • 11244254627 scopus 로고    scopus 로고
    • SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks
    • Virginia, October
    • S. Capkun, L. Buttyan, and J. Hubaux. SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks. In Proceedings of SASN 2003, Virginia, October 2003.
    • (2003) Proceedings of SASN 2003
    • Capkun, S.1    Buttyan, L.2    Hubaux, J.3
  • 29
    • 4143078106 scopus 로고    scopus 로고
    • Proceedings of 9th ACM Symposium on Access Control Models and Technologies (SACMAT 2004)
    • Yorklown Heights, NY, June
    • U. Hengartner and P. Steenkiste. Proceedings of 9th ACM Symposium on Access Control Models and Technologies (SACMAT 2004). In SACMAT, pages 11-20, Yorklown Heights, NY, June 2004.
    • (2004) SACMAT , pp. 11-20
    • Hengartner, U.1    Steenkiste, P.2
  • 30
    • 0041973497 scopus 로고    scopus 로고
    • Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks
    • San Francisco, CA, USA, April
    • Y. Hu, A. Perrig, and D. Johnson. Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks. In Proceedings of INFOCOM, San Francisco, CA, USA, April 2003.
    • (2003) Proceedings of INFOCOM
    • Hu, Y.1    Perrig, A.2    Johnson, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.