{"id":"https://openalex.org/W1885116905","doi":"https://doi.org/10.1007/978-0-387-79026-8_15","title":"Identity Deployment and Management in Wireless Mesh Networks","display_name":"Identity Deployment and Management in Wireless Mesh Networks","publication_year":2008,"publication_date":"2008-01-01","ids":{"openalex":"https://openalex.org/W1885116905","doi":"https://doi.org/10.1007/978-0-387-79026-8_15","mag":"1885116905"},"language":"en","primary_location":{"id":"doi:10.1007/978-0-387-79026-8_15","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-0-387-79026-8_15","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-0-387-79026-8_15.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Future of Identity in the Information Society","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/978-0-387-79026-8_15.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081083896","display_name":"Leonardo A. Martucci","orcid":"https://orcid.org/0000-0002-9980-3473"},"institutions":[{"id":"https://openalex.org/I43968019","display_name":"Karlstad University","ror":"https://ror.org/05s754026","country_code":"SE","type":"education","lineage":["https://openalex.org/I43968019"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Leonardo A. Martucci","raw_affiliation_strings":["Department of Computer Science, Karlstads University, Sweden","Karlstad University, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Karlstads University, Sweden","institution_ids":["https://openalex.org/I43968019"]},{"raw_affiliation_string":"Karlstad University, Sweden","institution_ids":["https://openalex.org/I43968019"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036739114","display_name":"Albin Zuccato","orcid":null},"institutions":[{"id":"https://openalex.org/I170053871","display_name":"TeliaSonera (Sweden)","ror":"https://ror.org/05tqy0n53","country_code":"SE","type":"company","lineage":["https://openalex.org/I170053871"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Albin Zuccato","raw_affiliation_strings":["R&D Informations Security, TeliaSonera, Sweden","TeliaSonera, Sweden"],"affiliations":[{"raw_affiliation_string":"R&D Informations Security, TeliaSonera, Sweden","institution_ids":["https://openalex.org/I170053871"]},{"raw_affiliation_string":"TeliaSonera, Sweden","institution_ids":["https://openalex.org/I170053871"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068293243","display_name":"Simone Fischer\u2010H\u00fcbner","orcid":"https://orcid.org/0000-0002-6938-4466"},"institutions":[{"id":"https://openalex.org/I43968019","display_name":"Karlstad University","ror":"https://ror.org/05s754026","country_code":"SE","type":"education","lineage":["https://openalex.org/I43968019"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Simone Fischer-H\u00fcbner","raw_affiliation_strings":["Department of Computer Science, Karlstads University, Sweden","Karlstad University, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Karlstads University, Sweden","institution_ids":["https://openalex.org/I43968019"]},{"raw_affiliation_string":"Karlstad University, Sweden","institution_ids":["https://openalex.org/I43968019"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5081083896"],"corresponding_institution_ids":["https://openalex.org/I43968019"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14993912,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"223","last_page":"233"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6410917043685913},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.635975182056427},{"id":"https://openalex.org/keywords/wireless-mesh-network","display_name":"Wireless mesh network","score":0.6265589594841003},{"id":"https://openalex.org/keywords/identity-management","display_name":"Identity management","score":0.5267680883407593},{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.48778635263442993},{"id":"https://openalex.org/keywords/provisioning","display_name":"Provisioning","score":0.4425677955150604},{"id":"https://openalex.org/keywords/enabling","display_name":"Enabling","score":0.441967248916626},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.4366692006587982},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.41716110706329346},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4018329083919525},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.38701796531677246},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.3426802158355713},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3229166269302368},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.14850392937660217}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6410917043685913},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.635975182056427},{"id":"https://openalex.org/C31548570","wikidata":"https://www.wikidata.org/wiki/Q6453712","display_name":"Wireless mesh network","level":4,"score":0.6265589594841003},{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.5267680883407593},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.48778635263442993},{"id":"https://openalex.org/C172191483","wikidata":"https://www.wikidata.org/wiki/Q1071806","display_name":"Provisioning","level":2,"score":0.4425677955150604},{"id":"https://openalex.org/C22607594","wikidata":"https://www.wikidata.org/wiki/Q5375150","display_name":"Enabling","level":2,"score":0.441967248916626},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4366692006587982},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.41716110706329346},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4018329083919525},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.38701796531677246},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.3426802158355713},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3229166269302368},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.14850392937660217},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-0-387-79026-8_15","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-0-387-79026-8_15","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-0-387-79026-8_15.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Future of Identity in the Information Society","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.1007/978-0-387-79026-8_15","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-0-387-79026-8_15","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-0-387-79026-8_15.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Future of Identity in the Information Society","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320317209","display_name":"Fundaci\u00f3n Instituto de Investigaci\u00f3n Sanitaria de Santiago de Compostela","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1885116905.pdf","grobid_xml":"https://content.openalex.org/works/W1885116905.grobid-xml"},"referenced_works_count":11,"referenced_works":["https://openalex.org/W595562566","https://openalex.org/W1501894674","https://openalex.org/W1520914943","https://openalex.org/W1851031742","https://openalex.org/W1974010635","https://openalex.org/W1987383232","https://openalex.org/W2044931626","https://openalex.org/W2095708839","https://openalex.org/W2133420971","https://openalex.org/W2165210192","https://openalex.org/W3029232588"],"related_works":["https://openalex.org/W1974860256","https://openalex.org/W4321381871","https://openalex.org/W4383065492","https://openalex.org/W4378651134","https://openalex.org/W2088748318","https://openalex.org/W2111901522","https://openalex.org/W2289630402","https://openalex.org/W3048384332","https://openalex.org/W2017432143","https://openalex.org/W1973694374"],"abstract_inverted_index":{"This":[0],"paper":[1],"introduces":[2],"the":[3,91,101],"problem":[4],"of":[5,20,39,69,75],"combining":[6],"security":[7,40,102],"and":[8,35,41,62,65,81,89,103],"privacy-friendly":[9,25,95],"provisioning":[10],"in":[11,50],"wireless":[12,32],"mesh":[13,33],"network":[14],"environments.":[15],"We":[16],"present":[17],"a":[18,24,94,109],"set":[19,38,74],"non-functional":[21],"requirements":[22],"for":[23,31,44,93],"identity":[26],"management":[27],"(IdM)":[28],"system":[29,97],"suitable":[30],"networks":[34],"derive":[36],"another":[37],"privacy":[42,104],"properties":[43],"digital":[45],"identifiers":[46],"to":[47,72,87],"be":[48],"used":[49],"such":[51],"networks.":[52],"Later,":[53],"we":[54],"compare":[55],"two":[56],"existing":[57],"identifiers,":[58],"anonymous":[59,63],"attribute":[60],"certificates":[61],"credentials,":[64],"verify":[66],"if":[67],"any":[68],"those":[70],"conforms":[71],"our":[73],"defined":[76],"properties.":[77],"A":[78],"business":[79,83],"model":[80],"some":[82],"cases":[84],"are":[85],"presented":[86],"support":[88],"justify":[90],"need":[92],"IdM":[96],"not":[98],"only":[99],"from":[100,108],"perspective,":[105],"but":[106],"also":[107],"business-enabler":[110],"perspective.":[111]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
