{"id":"https://openalex.org/W2050634775","doi":"https://doi.org/10.1109/wcnc.2013.6555288","title":"Group access control with blacklist for data dissemination in mobile opportunistic networks","display_name":"Group access control with blacklist for data dissemination in mobile opportunistic networks","publication_year":2013,"publication_date":"2013-04-01","ids":{"openalex":"https://openalex.org/W2050634775","doi":"https://doi.org/10.1109/wcnc.2013.6555288","mag":"2050634775"},"language":"en","primary_location":{"id":"doi:10.1109/wcnc.2013.6555288","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc.2013.6555288","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110913922","display_name":"T.\u2010L. HO","orcid":null},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Tzu-Hsin Ho","raw_affiliation_strings":["Department of Computer Science, National Chiao Tung University, Hsinchu, Taiwan","Department of Computer Science; National Chiao Tung University; Hsinchu; Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National Chiao Tung University, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I148366613"]},{"raw_affiliation_string":"Department of Computer Science; National Chiao Tung University; Hsinchu; Taiwan","institution_ids":["https://openalex.org/I148366613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111428778","display_name":"Chih\u2010Wei Yi","orcid":null},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chih-Wei Yi","raw_affiliation_strings":["Department of Computer Science, National Chiao Tung University, Hsinchu, Taiwan","Department of Computer Science; National Chiao Tung University; Hsinchu; Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National Chiao Tung University, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I148366613"]},{"raw_affiliation_string":"Department of Computer Science; National Chiao Tung University; Hsinchu; Taiwan","institution_ids":["https://openalex.org/I148366613"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045060328","display_name":"Chien\u2010Chao Tseng","orcid":"https://orcid.org/0000-0001-9654-0084"},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chien-Chao Tseng","raw_affiliation_strings":["Department of Computer Science, National Chiao Tung University, Hsinchu, Taiwan","Department of Computer Science; National Chiao Tung University; Hsinchu; Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National Chiao Tung University, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I148366613"]},{"raw_affiliation_string":"Department of Computer Science; National Chiao Tung University; Hsinchu; Taiwan","institution_ids":["https://openalex.org/I148366613"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5110913922"],"corresponding_institution_ids":["https://openalex.org/I148366613"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14035203,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"3494","issue":null,"first_page":"4410","last_page":"4415"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blacklist","display_name":"Blacklist","score":0.8681392669677734},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7607801556587219},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7451416254043579},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6495985984802246},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5608786940574646},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.5168981552124023},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.48895013332366943},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4510103166103363},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.417418509721756},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33268821239471436}],"concepts":[{"id":"https://openalex.org/C2781345505","wikidata":"https://www.wikidata.org/wiki/Q2535979","display_name":"Blacklist","level":2,"score":0.8681392669677734},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7607801556587219},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7451416254043579},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6495985984802246},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5608786940574646},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.5168981552124023},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.48895013332366943},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4510103166103363},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.417418509721756},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33268821239471436},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wcnc.2013.6555288","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc.2013.6555288","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1498316612","https://openalex.org/W2032094375","https://openalex.org/W2040223374","https://openalex.org/W2067877587","https://openalex.org/W2076046175","https://openalex.org/W2138001464","https://openalex.org/W2141274790","https://openalex.org/W2149927846","https://openalex.org/W2171544289","https://openalex.org/W2186247005","https://openalex.org/W6669423477","https://openalex.org/W6686348237"],"related_works":["https://openalex.org/W3172840274","https://openalex.org/W50122730","https://openalex.org/W2245533262","https://openalex.org/W3129811130","https://openalex.org/W2265547225","https://openalex.org/W4379616178","https://openalex.org/W3185731761","https://openalex.org/W4292158217","https://openalex.org/W2181543702","https://openalex.org/W2035681852"],"abstract_inverted_index":{"In":[0,41,99],"mobile":[1,132,137],"opportunistic":[2,138],"networks,":[3],"security":[4],"is":[5,28,90,134],"a":[6,29,44,61,104],"major":[7],"concern":[8],"in":[9,69,131],"consequence":[10],"of":[11,55,85],"store-carry-and-forward":[12],"data":[13,122],"dissemination.":[14],"To":[15],"guarantee":[16],"that":[17,32,112],"messages":[18],"can":[19,36,59,72],"be":[20],"only":[21,51],"accessed":[22],"by":[23],"authorized":[24],"users,":[25],"access":[26,39,73,108],"control":[27,109],"necessity.":[30],"Fuzzy-IBE":[31,58,105],"has":[33],"been":[34],"proposed":[35],"provide":[37,60],"group":[38,71],"control.":[40],"addition,":[42],"if":[43],"sender":[45],"wants":[46],"to":[47,52,64,82,115],"expose":[48],"his/her":[49,56],"message":[50],"some":[53],"members":[54,119],"group,":[57],"whitelist":[62,96],"mechanism":[63,89],"further":[65],"indicate":[66],"which":[67,125],"users":[68,114],"the":[70,74,83,86,95],"data.":[75],"Because":[76],"overhead":[77],"linearly":[78],"increases":[79],"with":[80],"respect":[81],"length":[84],"whitelist,":[87],"this":[88,100],"not":[91,127],"sufficiently":[92],"scalable":[93],"as":[94],"becomes":[97],"larger.":[98],"work,":[101],"we":[102],"propose":[103],"based":[106],"negative":[107],"scheme":[110],"(NAC)":[111],"allows":[113],"selectively":[116],"exclude":[117],"specific":[118],"from":[120],"accessing":[121],"dynamically.":[123],"NAC,":[124],"does":[126],"require":[128],"intensive":[129],"calculation":[130],"devices,":[133],"suitable":[135],"for":[136],"networks.":[139]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
