메뉴 건너뛰기




Volumn , Issue , 2008, Pages 286-294

A soPhisticated privacy-enhanced yet accountable security framework for metropolitan wireless mesh networks

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION AND KEY AGREEMENT; BROADBAND INTERNET ACCESS; DISTRIBUTED COMPUTING SYSTEMS; GROUP SIGNATURES; INTERNATIONAL CONFERENCES; MALICIOUS USERS; MULTI-HOP WIRELESS MESH NETWORKS; PRIVACY PRESERVATION; SECURITY AND PRIVACY; SECURITY AND PRIVACY ISSUES; SECURITY FRAMEWORKS; SECURITY RESEARCH; SERVICE-ORIENTED APPLICATIONS; USER ACCESS CONTROL; USER PRIVACY; WIRELESS MESH NETWORKS;

EID: 51849119157     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDCS.2008.18     Document Type: Conference Paper
Times cited : (28)

References (23)
  • 3
    • 34547545598 scopus 로고    scopus 로고
    • A secure authentication and billing architecture for wireless mesh networks
    • to Appear
    • Y. Zhang and Y. Fang, "A secure authentication and billing architecture for wireless mesh networks," ACM Wireless Networks, to Appear.
    • ACM Wireless Networks
    • Zhang, Y.1    Fang, Y.2
  • 4
    • 33749856769 scopus 로고    scopus 로고
    • Arsa: An attack-resilient security architecture for multi-hop wireless mesh networks
    • Oct
    • _, "Arsa: an attack-resilient security architecture for multi-hop wireless mesh networks," IEEE Journal on Selected Areas in Communications, vol. 24, no. 10, pp. 1916-1928, Oct. 2006.
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.10 , pp. 1916-1928
    • Zhang, Y.1    Fang, Y.2
  • 9
    • 0017930809 scopus 로고    scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, no. 2.
    • Communications of the ACM , vol.21 , Issue.2
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 11
    • 1542326337 scopus 로고    scopus 로고
    • A micro-payment scheme encouraging collaboration in multi-hop cellular networks
    • N. Salem, L. Buttyan, J. Hubaux, and M. Jakobsson, "A micro-payment scheme encouraging collaboration in multi-hop cellular networks," in ACM MobiHoc, 2003.
    • (2003) ACM MobiHoc
    • Salem, N.1    Buttyan, L.2    Hubaux, J.3    Jakobsson, M.4
  • 13
    • 51849145262 scopus 로고    scopus 로고
    • A sophisticated privacy-enhanced yet accountable security framework for wireless mesh networks,
    • Technical Report
    • K. Ren and W. Lou, "A sophisticated privacy-enhanced yet accountable security framework for wireless mesh networks," in Technical Report, 2008.
    • (2008)
    • Ren, K.1    Lou, W.2
  • 14
    • 84861587712 scopus 로고    scopus 로고
    • Client puzzles: A cryptographic countermeasure against connection depletion attacks
    • A. Juels and J. Brainard, "Client puzzles: A cryptographic countermeasure against connection depletion attacks," in 6th NDSS, 1999.
    • (1999) 6th NDSS
    • Juels, A.1    Brainard, J.2
  • 19
    • 34547484913 scopus 로고    scopus 로고
    • Achieving privacy in mesh networks
    • X. Wu and N. Li, "Achieving privacy in mesh networks," in ACM SASN, 2006.
    • (2006) ACM SASN
    • Wu, X.1    Li, N.2
  • 21
    • 51849141536 scopus 로고    scopus 로고
    • A novel localized authentication scheme in ieee 802.11 based wireless mesh networks
    • X. Lin, X. Ling, H. Zhu, P.-H. Ho, and X. Shen, "A novel localized authentication scheme in ieee 802.11 based wireless mesh networks," International Journal of Security and Networks, vol. 3, no. 2, pp. 122-132, 2008.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.2 , pp. 122-132
    • Lin, X.1    Ling, X.2    Zhu, H.3    Ho, P.-H.4    Shen, X.5
  • 22
    • 33746373934 scopus 로고    scopus 로고
    • A novel privacy preserving authentication and access control scheme for pervasive computing environment
    • July
    • K. Ren, W. Lou, K. Kim, and R. Deng, "A novel privacy preserving authentication and access control scheme for pervasive computing environment," IEEE Transactions on Vehicular Technology (TVT), vol. 55, no. 4, pp. 1373-1384, July 2006.
    • (2006) IEEE Transactions on Vehicular Technology (TVT) , vol.55 , Issue.4 , pp. 1373-1384
    • Ren, K.1    Lou, W.2    Kim, K.3    Deng, R.4
  • 23
    • 33846307093 scopus 로고    scopus 로고
    • Privacy-enhanced, attack-resilient access control in pervasive computing environments with optional context authentication capability
    • K. Ren and W. Lou, "Privacy-enhanced, attack-resilient access control in pervasive computing environments with optional context authentication capability," ACM Mobile Networks and Applications (MONET) (special issue on Wireless Broadband Access), vol. 12, pp. 79-92, 2007.
    • (2007) ACM Mobile Networks and Applications (MONET) (special issue on Wireless Broadband Access) , vol.12 , pp. 79-92
    • Ren, K.1    Lou, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.