A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Group signatures with verifier-local revocation
Proceedings of the 11th ACM conference on Computer and communications security
ICDCS '08 Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems
Anonymous user communication for privacy protection in wireless metropolitan mesh networks
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
A Role Based Privacy-Aware Secure Routing Protocol for Wireless Mesh Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
The presence of ubiquitous connectivity provided by wireless communications and mobile computing has changed the way humans interact with information. At the same time, it has made communication security and privacy a hot-button issue. In this article we address the security and privacy concerns in wireless access networks. We first discuss the general cryptographic means to design privacy-preserving security protocols, where the dilemma of attaining both security and privacy goals, especially user accountability vs. user privacy, is highlighted. We then present a novel authentication framework that integrates a new key management scheme based on the principle of separation of powers and an adapted construction of Boneh and Shacham's group signature scheme, as an enhanced resort to simultaneously achieve security, privacy, and accountability in wireless access networks.