WLAN Mesh security association scheme in trusted computing environment

被引:0
|
作者
Xiao, Yue-Lei [1 ]
Wang, Yu-Min [2 ]
Pang, Liao-Jun [3 ]
Tan, Shi-Chong [2 ]
机构
[1] Institute of IOT and IT-Based Industrialization, Xi'an University of Posts & Telecommunications, Xi'an,710061, China
[2] State Key Lab. of Integrated Service Networks, Xidian University, Xi'an,710071, China
[3] School of Life Science and Technology, Xidian University, Xi'an,710071, China
来源
关键词
D O I
10.3969/j.issn.1000-436x.2014.07.012
中图分类号
学科分类号
摘要
引用
收藏
页码:94 / 103
相关论文
共 50 条
  • [11] An assistive system for re-association management in a WLAN mesh environment
    Fuicu, S.
    Stratulat, B.
    Marcu, M.
    [J]. THIRD INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES, AND TECHNOLOGIES, PROCEEDINGS, 2009, : 494 - 499
  • [12] From trusted information security controls to a trusted information security environment
    Von Solms, R
    Van De Haar, H
    [J]. INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 29 - 36
  • [13] A Privacy-Preserving Outsourcing Computing Scheme Based on Secure Trusted Environment
    Liu, Zewei
    Hu, Chunqiang
    Li, Ruinian
    Xiang, Tao
    Li, Xingwang
    Yu, Jiguo
    Xia, Hui
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (03) : 2325 - 2336
  • [14] An Efficient Security Architecture for Trusted Computing
    Yin Zhixi
    [J]. 2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2009, : 599 - 601
  • [15] OSLO: Improving the security of trusted computing
    Kauer, Bernhard
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, 2007, : 229 - 237
  • [16] Provably Secure Trusted Access Protocol for WLAN Mesh Networks
    Ma, Zhuo
    Ma, Jianfeng
    Shen, Yulong
    [J]. EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 43 - +
  • [17] Security Architecture of Trusted Virtual Machine Monitor for Trusted Computing
    HUANG Qiang1
    2. Naval Institute of Computing Technology
    3. College of Information Technical Science
    [J]. Wuhan University Journal of Natural Sciences, 2007, (01) : 13 - 16
  • [18] The trust measurement scheme in trusted computing
    Zhang, Li-Qiang
    Zhang, Huan-Guo
    Zhang, Fan
    [J]. Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (05): : 586 - 591
  • [19] The Trusted Computing exemplary with Astonishing Security for Cloud Computing
    Devi, Ramya M.
    Balamurugan, P. S.
    Thanushkodi, K.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (01): : 206 - 209
  • [20] System security model based on trusted access control under cloud computing environment
    Wang F.
    [J]. Wang, Fengqi (fengqiwang@21cn.com), 1600, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (10): : 236 - 242