WLAN Mesh security association scheme in trusted computing environment

被引:0
|
作者
Xiao, Yue-Lei [1 ]
Wang, Yu-Min [2 ]
Pang, Liao-Jun [3 ]
Tan, Shi-Chong [2 ]
机构
[1] Institute of IOT and IT-Based Industrialization, Xi'an University of Posts & Telecommunications, Xi'an,710061, China
[2] State Key Lab. of Integrated Service Networks, Xidian University, Xi'an,710071, China
[3] School of Life Science and Technology, Xidian University, Xi'an,710071, China
来源
关键词
D O I
10.3969/j.issn.1000-436x.2014.07.012
中图分类号
学科分类号
摘要
引用
收藏
页码:94 / 103
相关论文
共 50 条
  • [1] A scheme based on trusted computing for terminal security
    Zhang, Jun
    Liu, Wei-peng
    Zhou, Zheng
    Li, Jian
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 218 - +
  • [2] An Efficient Authentication Protocol for WLAN Mesh Networks in Trusted Environment
    Ma, Zhuo
    Ma, Jianfeng
    Moon, SangJae
    Li, Xinghua
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (03): : 430 - 437
  • [3] Security analysis and improvement of a mutual authentication scheme under trusted computing
    Bin Muhaya, Fahad T.
    [J]. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2015, 18 (1-2) : 37 - 44
  • [4] A Security Scheme for Fog Computing Environment of loT
    Fan, Yongkai
    Zhao, Guanqun
    Sun, Xiaofeng
    Wang, Jinghan
    Lei, Xia
    Xia, Fanglue
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL ACM WORKSHOP ON SECURITY AND PRIVACY FOR THE INTERNET-OF-THINGS (IOT S&P'19), 2019, : 58 - 59
  • [5] Mobile Security and Trusted Computing
    Mitchell, Chris
    [J]. IT-INFORMATION TECHNOLOGY, 2006, 48 (06): : 321 - 326
  • [6] TRUSTED COMPUTING AND INFORMATION SECURITY
    Zhang Huanguo
    Mu Yi
    [J]. CHINA COMMUNICATIONS, 2013, 10 (11) : IX - X
  • [7] TRUSTED COMPUTING AND INFORMATION SECURITY
    张焕国
    MU Yi
    [J]. China Communications, 2013, 10 (11) : 11 - 12
  • [8] Trusted Computing: Security and Applications
    Gallery, Eimear
    Mitchell, Chris J.
    [J]. CRYPTOLOGIA, 2009, 33 (03) : 217 - 245
  • [9] A Trusted Network Access Protocol for WLAN Mesh Networks
    Xiao, Yuelei
    Wang, Yumin
    Pang, Liaojun
    Tan, Shichong
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2013, E96D (12): : 2865 - 2869
  • [10] An enhanced scheme of enforcing DTE security policy based on trusted computing technology
    Liu, Wei-Peng
    Zuo, Xiao-Dong
    Huang, Qiang
    [J]. PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 3657 - +