{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:36:00Z","timestamp":1761676560209,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/wimob.2017.8115806","type":"proceedings-article","created":{"date-parts":[[2017,11,23]],"date-time":"2017-11-23T22:03:14Z","timestamp":1511474594000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["On the feasibility of attribute-based encryption for WLAN access control"],"prefix":"10.1109","author":[{"given":"Claudio","family":"Pisa","sequence":"first","affiliation":[]},{"given":"Tooska","family":"Dargahi","sequence":"additional","affiliation":[]},{"given":"Alberto","family":"Caponi","sequence":"additional","affiliation":[]},{"given":"Giuseppe","family":"Bianchi","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Blefari-Melazzi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Linux wireless - hostapd","year":"0","key":"ref33"},{"journal-title":"Charm A framework for rapidly prototyping cryptosystems","year":"0","key":"ref32"},{"journal-title":"LEDE project","year":"0","key":"ref31"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/978-3-642-32009-5_13","article-title":"Dynamic credentials and ciphertext delegation for attribute-based encryption","author":"sahai","year":"2012","journal-title":"Advances in Cryptology-CRYPTO 2012"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.158"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.33"},{"key":"ref12","first-page":"457","article-title":"Fuzzy identity-based encryption","author":"sahai","year":"2005","journal-title":"Advances in Cryptology-Eurocrypt"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315270"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1343","DOI":"10.1109\/TIFS.2013.2271848","article-title":"Attribute-based encryption with verifiable outsourced decryption","volume":"8","author":"lai","year":"2013","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2016.101"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2608343"},{"key":"ref18","article-title":"Expressive CP-ABE scheme for mobile devices in IoT satisfying constant-size keys and ciphertexts","author":"jo","year":"2017","journal-title":"IEEE Access"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_28"},{"key":"ref28","first-page":"1","article-title":"IEEE standard for information technology - telecommunications and information exchange between systems - local and metropolitan area networks - specific requirements - part 11:: MAC and PHY specifications","year":"2007","journal-title":"IEEE Std 802 11&#x2013;2007"},{"journal-title":"Press Release 2006","article-title":"WPA2 security now mandatory for Wi-Fi certified products","year":"0","key":"ref4"},{"journal-title":"OAuth the ABC attack (the alice and bob collusion attack)","year":"2016","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813647"},{"key":"ref6","article-title":"A practical, targeted, and stealthy attack against WPA enterprise authentication","author":"cassola","year":"2013","journal-title":"Proc of the 20th Annual Network and Distributed System Security Symposium ser NDSS'13"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/285243.285258"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2004.1345023"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2944789.2949546"},{"journal-title":"White Paper Cisco Visual Networking Index Global Mobile Data Traffic Forecast Update","year":"2017","key":"ref2"},{"key":"ref9","first-page":"568","article-title":"Decentralizing attribute-based encryption","author":"lewko","year":"2011","journal-title":"Advances in Cryptology-Eurocrypt"},{"journal-title":"(2016) ict facts and figures 2016","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.4134\/BKMS.2009.46.4.803"},{"key":"ref22","first-page":"1","article-title":"Benefits and vulnerabilities of Wi-Fi protected access 2 (WPA2)","author":"arana","year":"2006","journal-title":"INFS 612"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_19"},{"key":"ref24","first-page":"262","article-title":"Composable and modular anonymous credentials: definitions and practical constructions","author":"camenisch","year":"2014","journal-title":"Proc of the International Conference on the Theory and Application of Cryptology and Information Security"},{"key":"ref23","first-page":"1","article-title":"IEEE standard for local and metropolitan area networks-part-based network access control","year":"2010","journal-title":"IEEE Std 802 1X-2010"},{"key":"ref26","article-title":"U-prove cryptographic specification v l. 1","author":"paquin","year":"2011","journal-title":"Technical Report Microsoft Corporation"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/586111.586114"}],"event":{"name":"2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","start":{"date-parts":[[2017,10,9]]},"location":"Rome","end":{"date-parts":[[2017,10,11]]}},"container-title":["2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8106925\/8115727\/08115806.pdf?arnumber=8115806","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,6]],"date-time":"2019-10-06T18:30:42Z","timestamp":1570386642000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8115806\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/wimob.2017.8115806","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}