Abstract. Wireless Mesh Networks (WMNs) have emerged as a promising technology to provide low cost and scalable solutions for high speed Internet access and additional services. In hybrid WMNs, where mesh clients also act as relaying agents and form a mesh client network, it is important to provide users with an efficient anonymous and accountable authentication scheme. Accountability is required for the malicious users that are to be identified and revoked from the network access and related services. Promising revocation schemes are based on Certification Revocation Lists (CRLs). Since in hybrid WMNs mesh clients also authenticate other clients, distribution of these CRLs is an important task. In this paper, we propose and examine the per...
Abstract—Anonymity has received increasing attention in the literature due to the users ’ awareness ...
[[abstract]]Due to the ever-growing popularity mobile devices of various kinds have received worldwi...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
In this paper, we propose a framework, named as A-MAKE, which efficiently provides security, privacy...
The objective of this research is to investigate improved methods for distributing certificate revoc...
Wireless mesh network (WMN) consists of two parts: mesh access points which are relatively static an...
Techniques are presented herein to provide an efficient and secure signature scheme to authenticate ...
Abstract: Wireless Mesh Network (WMN) is a promising technology to meet the challenges of the presen...
Wireless Mesh Networks (WMNs) are multi-hop networks that have secured a significant position in the...
Hybrid wireless mesh network (WMN) consists of twotypes of nodes: Mesh Routers which are relatively ...
Wireless mesh networks (WMNs) are a kind of wireless ad hoc networks that are multi-hop where packet...
In the current paper, a new handover authentication protocol for IEEE802.11s Wireless mesh networks ...
International audienceDeployment of Wireless Mesh Networks (WMNs) is growing as they serve advantage...
In PKI (Public Key Infrastructure), certificate revocation list (CRL) carries important information ...
Hybrid wireless mesh network (WMN) consists of two types of nodes: Mesh Routers which are relativel...
Abstract—Anonymity has received increasing attention in the literature due to the users ’ awareness ...
[[abstract]]Due to the ever-growing popularity mobile devices of various kinds have received worldwi...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
In this paper, we propose a framework, named as A-MAKE, which efficiently provides security, privacy...
The objective of this research is to investigate improved methods for distributing certificate revoc...
Wireless mesh network (WMN) consists of two parts: mesh access points which are relatively static an...
Techniques are presented herein to provide an efficient and secure signature scheme to authenticate ...
Abstract: Wireless Mesh Network (WMN) is a promising technology to meet the challenges of the presen...
Wireless Mesh Networks (WMNs) are multi-hop networks that have secured a significant position in the...
Hybrid wireless mesh network (WMN) consists of twotypes of nodes: Mesh Routers which are relatively ...
Wireless mesh networks (WMNs) are a kind of wireless ad hoc networks that are multi-hop where packet...
In the current paper, a new handover authentication protocol for IEEE802.11s Wireless mesh networks ...
International audienceDeployment of Wireless Mesh Networks (WMNs) is growing as they serve advantage...
In PKI (Public Key Infrastructure), certificate revocation list (CRL) carries important information ...
Hybrid wireless mesh network (WMN) consists of two types of nodes: Mesh Routers which are relativel...
Abstract—Anonymity has received increasing attention in the literature due to the users ’ awareness ...
[[abstract]]Due to the ever-growing popularity mobile devices of various kinds have received worldwi...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...