WI-FAB: attribute-based WLAN access control, without pre-shared keys and backend infrastructures
暂无分享,去创建一个
[1] Bobby Bhattacharjee,et al. Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.
[2] Xiaoli Chu,et al. Coexistence of Wi-Fi and heterogeneous small cell networks sharing unlicensed spectrum , 2015, IEEE Communications Magazine.
[3] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[4] H. Boland,et al. Security issues of the IEEE 802.11b wireless LAN , 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513).
[5] Paul Arana,et al. Benefits and Vulnerabilities of Wi-Fi Protected Access 2 (WPA2) , 2006 .
[6] Joon S. Park,et al. WLAN Security: Current and Future , 2003, IEEE Internet Comput..
[7] Michael Luby,et al. A digital fountain approach to reliable distribution of bulk data , 1998, SIGCOMM '98.
[8] FrikkenKeith,et al. Attribute-Based Access Control with Hidden Policies and Hidden Credentials , 2006 .
[9] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[10] Guevara Noubir,et al. A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication , 2013, NDSS.
[11] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[12] Guevara Noubir,et al. Authenticating Privately over Public Wi-Fi Hotspots , 2015, CCS.
[13] David F. Ferraiolo,et al. Guide to Attribute Based Access Control (ABAC) Definition and Considerations , 2014 .
[14] D. Richard Kuhn,et al. Attribute-Based Access Control , 2017, Computer.
[15] Wun-She Yap,et al. Cryptanalysis of a CP-ABE scheme with policy in normal forms , 2016, Inf. Process. Lett..
[16] Tooska Dargahi,et al. ABAKA: A novel attribute-based k-anonymous collaborative solution for LBSs , 2016, Comput. Commun..
[17] Xiang-Yang Li,et al. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption , 2016, IEEE Transactions on Information Forensics and Security.
[18] Hamid Aghvami,et al. A survey on mobile data offloading: technical and business perspectives , 2013, IEEE Wireless Communications.
[19] Tooska Dargahi,et al. On the Feasibility of Attribute-Based Encryption on Smartphone Devices , 2015, IoT-Sys@MobiSys.
[20] Mikhail J. Atallah,et al. Attribute-Based Access Control with Hidden Policies and Hidden Credentials , 2006, IEEE Transactions on Computers.