Achieving secure and convenient WLAN sharing in personal
نویسندگان
چکیده
منابع مشابه
Achieving Secure cloud Data Sharing
Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users’ data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new emerging technology, users’ fears of losing control of their own data (particularly, financ...
متن کاملAchieving dynamic privileges in secure data sharing on cloud storage
With rapid development of cloud computing, more and more enterprises will outsource their sensitive data for sharing in a cloud. Many data sharing and access control schemes have been submitted. However, dynamic privileges among the access groups were not considered. In many circumstances, some users may have higher privileges than others, and they can decrypt more contents than those with low ...
متن کاملWLAN Location Sharing through a
In the last few years, WLAN has seen immense growth and it will continue this trend due to the fact that it provides convenient connectivity as well as high speed links. Furthermore, the infrastructure already exists in most public places and is cheap to extend. These advantages, together with the fact that WLAN covers a large area and is not restricted to line of sight, have led to developing ...
متن کاملAn RFID secure authentication mechanism in WLAN
With the thriving evolution of information technology, network technology attains to maturity and Wireless Local Area Network (WLAN) becomes universal as well. To discipline the right of network usage, network system identifies users before providing network services or resources. In the historical researches, the conventional authentication mechanisms frequently adopted the names and passwords...
متن کاملHealthShare: Achieving secure and privacy-preserving health information sharing through health social networks
In this paper, we propose two attribute-oriented authentication and transmission schemes for secure and privacy-preserving health information sharing in health social networks (HSNs). HSN users are tagged with formalized attributes. The attribute-oriented authentication scheme enables each HSN user to generate an attribute proof for itself, where its sensitive attributes are anonymized. By veri...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IET Information Security
سال: 2020
ISSN: 1751-8709,1751-8717
DOI: 10.1049/iet-ifs.2020.0134