{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:05:36Z","timestamp":1729616736782,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/wowmom.2012.6263776","type":"proceedings-article","created":{"date-parts":[[2012,8,16]],"date-time":"2012-08-16T16:06:16Z","timestamp":1345133176000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Authentication and authorisation mechanisms in support of secure access to WMN resources"],"prefix":"10.1109","author":[{"given":"Markus","family":"Anwander","sequence":"first","affiliation":[]},{"given":"Torsten","family":"Braun","sequence":"additional","affiliation":[]},{"given":"Almerima","family":"Jamakovic","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Staub","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"Remote Authentication Dial in User Service (RADIUS)","volume":"2865","author":"rigney","year":"0","journal-title":"RFC"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.060710.00062"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1454586.1454593"},{"key":"1","article-title":"A Panorama of Wireless Mesh Networks: Architecture, Application and Technical Challenges","author":"moustafa","year":"0","journal-title":"Proc of International Workshop on Wireless Mesh Moving Towards Applications (Wimeshnets 06) 2006"},{"key":"7","article-title":"Extensible Authentication Protocol (EAP)","volume":"3748","author":"aboba","year":"2004","journal-title":"RFC"},{"journal-title":"Eduroam Service Definition and Implementation Plan","year":"2008","author":"milinovic","key":"6"},{"journal-title":"AAI - Authentication and Authorisation Infrastructure System and Interface Specification","year":"2004","author":"graf","key":"5"},{"journal-title":"Shibboleth Architecture Protocols and Profiles","year":"2005","author":"carmody","key":"4"},{"key":"9","article-title":"Security Architecture in a Multi-hop Mesh Network","author":"cheikhrouhou","year":"2006","journal-title":"Proc of the 5th Conference on Security and Network Architectures (SAR 06)"},{"key":"8","article-title":"Authentication in Multi-hop Wireless Mesh Networks","author":"khan","year":"2006","journal-title":"16th Inter Conference on Computer Science and Engineering (CISE 2006)"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-10838-9_24","article-title":"Securing Remote Access Inside Wireless Mesh Networks","author":"manulis","year":"2009","journal-title":"Information Security Applications 10th International Workshop (WISA 2009)"}],"event":{"name":"2012 IEEE Thirteenth International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","start":{"date-parts":[[2012,6,25]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2012,6,28]]}},"container-title":["2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6253016\/6263669\/06263776.pdf?arnumber=6263776","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T18:56:23Z","timestamp":1497984983000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6263776\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/wowmom.2012.6263776","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}