{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:52:05Z","timestamp":1725515525196},"publisher-location":"Boston, MA","reference-count":14,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781441946294"},{"type":"electronic","value":"9780387790268"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-0-387-79026-8_15","type":"book-chapter","created":{"date-parts":[[2008,6,14]],"date-time":"2008-06-14T06:54:33Z","timestamp":1213426473000},"page":"223-233","source":"Crossref","is-referenced-by-count":0,"title":["Identity Deployment and Management in Wireless Mesh Networks"],"prefix":"10.1007","author":[{"given":"Leonardo A.","family":"Martucci","sequence":"first","affiliation":[]},{"given":"Albin","family":"Zuccato","sequence":"additional","affiliation":[]},{"given":"Simone","family":"Fischer-H\u00fcbner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"ITU-T Recommendation X.509, The Directory: public-key and attribute certificate frameworks. Recommendation X.509 \u2014 International Telecommunications Union, The International Telegraph and Telephone Consultative Committee, Data Communication Networks: Open Systems Interconnection (OSI); Security, Structure and Applications, Aug 2005."},{"key":"15_CR2","unstructured":"IEEE P802.11 TGs. Status of Project IEEE 802.11s, Mar 2007. See http:\/\/www. ieee802.org\/11\/Reports\/tgs_update.htm."},{"key":"15_CR3","unstructured":"Matthias Bauer, Martin Meints, and Marit Hansen. D3.1: Structured Overview on Prototypes and Concepts of Identity Management Systems. Technical report, FIDIS \u2014 Future of Identity in the Information Society, 15 Sep 2005."},{"issue":"2","key":"15_CR4","first-page":"120","volume":"16","author":"B Vicente","year":"2006","unstructured":"Vicente Benjumea, Javier Lopez, and Jose Maria Troya. Anonymous Attribute Certificates based on Traceable Signatures. Internet Research: Electronic Networking Applications and Policy. Special Issue on Privacy and Anonymity in the Digital Era: Theory, Technologies and Practice, 16(2): 120\u2013139, 2006.","journal-title":"Internet Research: Electronic Networking Applications and Policy. Special Issue on Privacy and Anonymity in the Digital Era: Theory, Technologies and Practice"},{"key":"15_CR5","unstructured":"Jan Camenisch. Efficient Private Credential Systems and Applications: Cryptography for Privacy \u2014 Credential+ Systems. 3rd FIDIS Doctoral Consortium Event, Stockholm, Sweden, 9\u201313 Aug 2006."},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, and Mira Meyerovich. How to Win the Clone Wars: Efficient Periodic n-Times Anonymous Authentication. In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006), 30 Oct-3 Nov 2006.","DOI":"10.1145\/1180405.1180431"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Jan Camenisch and Anna Lysyanskaya. An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT 2001), volume 2045 of Lecture Notes in Computer Science, pages 93-118. Springer, 2001.","DOI":"10.1007\/3-540-44987-6_7"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Jan Camenisch and Anna Lysyanskaya. A Signature Scheme with Efficient Protocols. In Security in Communication Networks: Third International Conference (SCN 2002), volume 2576\/2003 of Lecture Notes in Computer Science, pages 268-289, Amalfi, Italy, 12\u201313 Sep 2002. Springer Berlin\/Heidelberg, LNCS 2576.","DOI":"10.1007\/3-540-36413-7_20"},{"key":"15_CR9","unstructured":"Jan Camenisch and Markus Stadler. Proof systems for general statements about discrete logarithms. Technical Report TR 260, Institute for Theoretical Computer Science, ETH Z\u00fcrich, Mar 1997."},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"John R. Douceur. The Sybil Attack. In P. Druschel, F. Kaashoek, and A. Rowstron, editors, Peer-to-Peer Systems: Proceedings of the 1 st International Peer-to-Peer Systems Workshop (IPTPS), volume 2429, pages 251-260. Springer-Verlag, 7\u20138 Mar 2002.","DOI":"10.1007\/3-540-45748-8_24"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Marco Gruteser and Dirk Grunwald. Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis. In Parviz Kermani, editor, Proceedings of the 1 st ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH 2003), 19 Sep 2003.","DOI":"10.1145\/941326.941334"},{"key":"15_CR12","unstructured":"Leonardo A. Martucci. The Identity Anonymity Paradox: on the Relationship between Identification, Anonymity and Security in Mobile Ad Hoc Networks, Licentiate Thesis, Karlstad University Studies 2006:36, September 2006."},{"key":"15_CR13","unstructured":"Andreas Pfitzmann and Marit Hansen. Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management \u2014 A Consolidated Proposal for Terminology v0.30, 26 Nov 2007. See http:\/\/dud.inf.tu-dresden.de\/ literatur\/."},{"issue":"3","key":"15_CR14","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/BF00196725","volume":"4","author":"CP Schnorr","year":"1991","unstructured":"Claus P. Schnorr. Efficient signature generation for smart cards. Journal of Cryptology, 4(3):239\u2013252, 1991.","journal-title":"Journal of Cryptology"}],"container-title":["The Future of Identity in the Information Society"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-79026-8_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T04:06:38Z","timestamp":1619669198000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-79026-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9781441946294","9780387790268"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-79026-8_15","relation":{},"subject":[],"published":{"date-parts":[[2008]]}}}