메뉴 건너뛰기




Volumn 9, Issue 3, 2012, Pages 443-446

On the security of a ticket-based anonymity system with traceability property in wireless mesh networks

Author keywords

anonymity; cryptanalysis; traceability.; WMNs

Indexed keywords

MESH GENERATION; WIRELESS MESH NETWORKS (WMN);

EID: 84863392461     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2011.53     Document Type: Article
Times cited : (2)

References (10)
  • 1
    • 33845726678 scopus 로고    scopus 로고
    • Securing vehicular ad hoc networks
    • M. Raya and J-P. Hubaux, "Securing Vehicular Ad Hoc Networks," J. Computer Security, special issue on security of ad hoc and sensor networks, vol. 15, no. 1, pp. 39-68, 2007. (Pubitemid 46012642)
    • (2007) Journal of Computer Security , vol.15 , Issue.1 , pp. 39-68
    • Raya, M.1    Hubaux, J.-P.2
  • 2
    • 0002681959 scopus 로고
    • Untraceable off-line cash in wallets with observers
    • S. Brands, "Untraceable Off-Line Cash in Wallets with Observers," Proc. CRYPTO '93, pp. 302-318, 1993.
    • (1993) Proc. CRYPTO '93 , pp. 302-318
    • Brands, S.1
  • 4
    • 51349100827 scopus 로고    scopus 로고
    • A security architecture achieving anonymity and traceability in wireless mesh networks
    • J. Sun, C. Zhang, and Y. Fang, "A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks," Proc. IEEE Conf. Computer Comm., pp. 1687-1695, 2008.
    • (2008) Proc. IEEE Conf. Computer Comm. , pp. 1687-1695
    • Sun, J.1    Zhang, C.2    Fang, Y.3
  • 5
    • 78751651500 scopus 로고    scopus 로고
    • SAT: A security architecture achieving anonymity and traceability in wireless mesh networks
    • J. Sun, C. Zhang, Y. Zhang, and Y. Fang, "SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks," IEEE Trans. Dependable and Secure Computing, vol. 8, no. 2, pp. 295-307, 2011.
    • (2011) IEEE Trans. Dependable and Secure Computing , vol.8 , Issue.2 , pp. 295-307
    • Sun, J.1    Zhang, C.2    Zhang, Y.3    Fang, Y.4
  • 7
    • 33846050393 scopus 로고    scopus 로고
    • ID-based restrictive partially blind signatures and applications
    • DOI 10.1016/j.jss.2006.02.046, PII S0164121206000719
    • X. Chen, F. Zhang, and S. Liu, "ID-Based Restrictive Partially Blind Signatures and Applications," J. Systems and Software, vol. 80, no. 2, pp. 164-171, 2007. (Pubitemid 46074166)
    • (2007) Journal of Systems and Software , vol.80 , Issue.2 , pp. 164-171
    • Chen, X.1    Zhang, F.2    Liu, S.3
  • 8
    • 52049103125 scopus 로고    scopus 로고
    • Analysis of id-based restrictive partially blind signatures and applications
    • X. Hu and S. Huang, "Analysis of ID-Based Restrictive Partially Blind Signatures and Applications," J. Systems and Software, vol. 81, no. 11, pp. 1951-1954, 2008.
    • (2008) J. Systems and Software , vol.81 , Issue.11 , pp. 1951-1954
    • Hu, X.1    Huang, S.2
  • 9
    • 33751529199 scopus 로고    scopus 로고
    • Securing mobile ad hoc networks with certificateless public keys
    • DOI 10.1109/TDSC.2006.58
    • Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Securing Mobile Ad Hoc Networks with Certificateless Public Keys," IEEE Trans. Dependable and Secure Computing, vol. 3, no. 4, pp. 386-399, Oct. 2006. (Pubitemid 44837040)
    • (2006) IEEE Transactions on Dependable and Secure Computing , vol.3 , Issue.4 , pp. 386-399
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.