Privacy-Preserving Quick Authentication in Fast Roaming Networks
暂无分享,去创建一个
[1] Yvon Gourhant,et al. AAA in vehicular communication on highways with ad hoc networking support: a proposed architecture , 2005, VANET '05.
[2] Qi He,et al. The quest for personal control over mobile location privacy , 2004, IEEE Communications Magazine.
[3] R. Poovendran,et al. CARAVAN: Providing Location Privacy for VANET , 2005 .
[4] Maxim Raya,et al. The security of vehicular ad hoc networks , 2005, SASN '05.
[5] Farooq Bari,et al. An AAA based service customization framework for public WLANs , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[6] Allan C. Rubens,et al. Remote Authentication Dial In User Service (RADIUS) , 1997, RFC.
[7] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[8] Marco Gruteser,et al. Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis , 2003, WMASH '03.
[9] George C. Polyzos,et al. A peer-to-peer approach to wireless LAN roaming , 2003, WMASH '03.
[10] Srdjan Capkun,et al. The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.
[11] Markus Jakobsson,et al. On Quorum Controlled Asymmetric Proxy Re-encryption , 1999, Public Key Cryptography.
[12] N. Asokan,et al. Untraceability in mobile networks , 1995, MobiCom '95.
[13] Jörg Ott,et al. Drive-thru Internet: IEEE 802.11b for "automobile" users , 2004, IEEE INFOCOM 2004.
[14] Nalini Venkatasubramanian,et al. Security Issues in a Future Vehicular Network , 2002 .
[15] Steven D. Galbraith,et al. Implementing the Tate Pairing , 2002, ANTS.
[16] Adrian Perrig,et al. Challenges in Securing Vehicular Networks , 2005 .
[17] Fred B. Schneider,et al. Distributed Blinding for Distributed ElGamal Re-Encryption , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[18] Allan C. Rubens,et al. Remote Authentication Dial In User Service (RADIUS) , 2000, RFC.
[19] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[20] Helen J. Wang,et al. A Framework for Location Privacy in Wireless Networks , 2005 .
[21] Wei Liang,et al. On performance analysis of challenge/response based authentication in wireless networks , 2005, Comput. Networks.
[22] Wei-Kuan Shih,et al. Running cellular/PWLAN services: practical considerations for cellular/PWLAN architecture supporting interoperator roaming , 2006, IEEE Commun. Mag..
[23] Pierangela Samarati,et al. Location privacy in pervasive computing , 2008 .
[24] Ian F. Akyildiz,et al. A new signaling protocol for intersystem roaming in next-generation wireless systems , 2001, IEEE J. Sel. Areas Commun..
[25] Marco Gruteser,et al. USENIX Association , 1992 .
[26] Kaoru Sezaki,et al. Enhancing wireless location privacy using silent period , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[27] Paulo S. L. M. Barreto,et al. Efficient Algorithms for Pairing-Based Cryptosystems , 2002, CRYPTO.
[28] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.