Achieving secure and convenient WLAN sharing in personal

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Achieving Secure cloud Data Sharing

Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users’ data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new emerging technology, users’ fears of losing control of their own data (particularly, financ...

متن کامل

Achieving dynamic privileges in secure data sharing on cloud storage

With rapid development of cloud computing, more and more enterprises will outsource their sensitive data for sharing in a cloud. Many data sharing and access control schemes have been submitted. However, dynamic privileges among the access groups were not considered. In many circumstances, some users may have higher privileges than others, and they can decrypt more contents than those with low ...

متن کامل

WLAN Location Sharing through a

In the last few years, WLAN has seen immense growth and it will continue this trend due to the fact that it provides convenient connectivity as well as high speed links. Furthermore, the infrastructure already exists in most public places and is cheap to extend. These advantages, together with the fact that WLAN covers a large area and is not restricted to line of sight, have led to developing ...

متن کامل

An RFID secure authentication mechanism in WLAN

With the thriving evolution of information technology, network technology attains to maturity and Wireless Local Area Network (WLAN) becomes universal as well. To discipline the right of network usage, network system identifies users before providing network services or resources. In the historical researches, the conventional authentication mechanisms frequently adopted the names and passwords...

متن کامل

HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks

In this paper, we propose two attribute-oriented authentication and transmission schemes for secure and privacy-preserving health information sharing in health social networks (HSNs). HSN users are tagged with formalized attributes. The attribute-oriented authentication scheme enables each HSN user to generate an attribute proof for itself, where its sensitive attributes are anonymized. By veri...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IET Information Security

سال: 2020

ISSN: 1751-8709,1751-8717

DOI: 10.1049/iet-ifs.2020.0134