메뉴 건너뛰기




Volumn 9, Issue 12, 2010, Pages 1713-1731

Wifi-reports: Improving wireless network selection with collaboration

Author keywords

802.11; anonymity; Privacy; reputation; wireless

Indexed keywords

802.11; ANONYMITY; PRIVACY; REPUTATION; WIRELESS;

EID: 78049511924     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2010.151     Document Type: Article
Times cited : (27)

References (44)
  • 2
    • 78049516304 scopus 로고    scopus 로고
    • Broadband Reports, http://www.dslreports.com, 2010.
    • (2010) Broadband Reports
  • 3
    • 78049511373 scopus 로고    scopus 로고
    • HTTP Analyzer, http://www.ieinspector.com/httpanalyzer, 2010.
    • (2010) HTTP Analyzer
  • 5
    • 78049506874 scopus 로고    scopus 로고
    • iPass, http://www.ipass.com, 2010.
    • (2010) IPass
  • 6
    • 78049524186 scopus 로고    scopus 로고
    • Jiwire, http://www.jiwire.com, 2010.
    • (2010) Jiwire
  • 7
    • 78049487542 scopus 로고    scopus 로고
    • Skyhook Wireless, http://www.skyhookwireless.com, 2010.
    • (2010) Skyhook Wireless
  • 8
    • 78049510150 scopus 로고    scopus 로고
    • Speedtest.net, http://www.speedtest.net, 2010.
    • (2010) Speedtest.net
  • 11
    • 78049494346 scopus 로고    scopus 로고
    • Fraud and related activity in connection with access devices
    • 18 U.S.C. Section 1029
    • Fraud and Related Activity in Connection with Access Devices, Homeland Security Act (18 U.S.C. Section 1029), 2002.
    • (2002) Homeland Security Act
  • 12
    • 78049518825 scopus 로고    scopus 로고
    • Wireless cocation tracking draws privacy questions
    • May
    • "Wireless Location Tracking Draws Privacy Questions," CNET, http://news.com.com/Wireless+location+tracking+draws+ privacy+questions/2100- 1028-3-6072992.html, May 2006.
    • (2006) CNET
  • 13
    • 78049511168 scopus 로고    scopus 로고
    • IEEE Std 802.11k-2008 (Amendment to IEEE Std 802.11-2007), IEEE Standard for Information Technology\-Telecommunications and Information Exchange between Systems\-Local and Metropolitan Area Networks\-Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (Phy) Specifications Amendment 1: Radio Resource Measurement of Wireless LANs, IEEE, June 2008
    • IEEE Std 802.11k-2008 (Amendment to IEEE Std 802.11-2007), IEEE Standard for Information Technology\-Telecommunications and Information Exchange between Systems\-Local and Metropolitan Area Networks\-Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (Phy) Specifications Amendment 1: Radio Resource Measurement of Wireless LANs, IEEE, June 2008.
  • 15
    • 20844435854 scopus 로고    scopus 로고
    • Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions
    • June
    • G. Adomavicius and A. Tuzhilin, "Toward the Next Generation of Recommender Systems: A Survey of the State-of-the-Art and Possible Extensions," IEEE Trans. Knowledge and Data Eng., vol. 17, no. 6, pp. 734-749, June 2005.
    • (2005) IEEE Trans. Knowledge and Data Eng. , vol.17 , Issue.6 , pp. 734-749
    • Adomavicius, G.1    Tuzhilin, A.2
  • 17
    • 20544449100 scopus 로고    scopus 로고
    • The one-more-rsa-inversion problems and the security of chaum's blind signature scheme
    • M. Bellare, C. Namprempre, D. Pointcheval, and M. Semanko, "The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme," J. Cryptology, vol. 16, no. 3, pp. 185-215, 2003.
    • (2003) J. Cryptology , vol.16 , Issue.3 , pp. 185-215
    • Bellare, M.1    Namprempre, C.2    Pointcheval, D.3    Semanko, M.4
  • 18
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • -Mar.
    • A.R. Beresford and F. Stajano, "Location Privacy in Pervasive Computing," IEEE Pervasive Computing, vol. 2, no. 1, pp. 46-55, Jan.-Mar. 2003.
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.1 , pp. 46-55
    • Beresford, A.R.1    Stajano, F.2
  • 20
    • 0036993076 scopus 로고    scopus 로고
    • Collaborative filtering with privacy via factor analysis
    • J. Canny, "Collaborative Filtering with Privacy via Factor Analysis," Proc. SIGIR, 2002.
    • (2002) Proc. SIGIR
    • Canny, J.1
  • 21
    • 0001604533 scopus 로고
    • Blind signatures for untraceable payments
    • D. Chaum, "Blind Signatures for Untraceable Payments," Proc. Advances in Cryptology, pp. 199-203, 1982.
    • (1982) Proc. Advances in Cryptology , pp. 199-203
    • Chaum, D.1
  • 25
    • 78049526178 scopus 로고    scopus 로고
    • Oct.
    • C. Doctorow, "Why Hotel WiFi Sucks," http://www.boingboing. net/2005/10/12/why-hotel-wifi-sucks.html, Oct. 2005.
    • (2005) Why Hotel WiFi Sucks
    • Doctorow, C.1
  • 34
    • 78049513446 scopus 로고    scopus 로고
    • v. 2009-04-15 Apr.
    • J. Pang, CRAWDAD Data Set cmu/hotspot (v. 2009-04-15), http://crawdad.cs.dartmouth.edu/cmu/hotspot, Apr. 2009.
    • (2009) CRAWDAD Data Set Cmu/hotspot
    • Pang, J.1
  • 37
    • 0344152271 scopus 로고    scopus 로고
    • Bandwidth estimation: Metrics, measurement techniques, and tools
    • Nov./Dec.
    • R.S. Prasad, M. Murray, C. Dovrolis, and K. Claffy, "Bandwidth Estimation: Metrics, Measurement Techniques, and Tools," IEEE Network, vol. 17, no. 6, pp. 27-35, Nov./Dec. 2003.
    • (2003) IEEE Network , vol.17 , Issue.6 , pp. 27-35
    • Prasad, R.S.1    Murray, M.2    Dovrolis, C.3    Claffy, K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.