Yang et al., 2005 - Google Patents
Generating authentication data without keeping a private key for MobilityYang et al., 2005
- Document ID
- 6577621805176830298
- Author
- Yang J
- Rhee K
- Publication year
- Publication venue
- 11th International Conference on Parallel and Distributed Systems (ICPADS'05)
External Links
Snippet
In the near future, people will wish to access many kinds of heterogeneous networks to use their services anytime and anywhere. Owing to the heterogeneity of networks, there must be many kinds of protocols to guarantee secure services. The mobile device can depend on a …
- 230000002633 protecting 0 abstract description 5
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
Similar Documents
Publication | Publication Date | Title |
---|---|---|
RU2325693C2 (en) | Methods of authentication of potentials members, which were invited to join the group | |
US6766353B1 (en) | Method for authenticating a JAVA archive (JAR) for portable devices | |
EP1714422B1 (en) | Establishing a secure context for communicating messages between computer systems | |
US7689828B2 (en) | System and method for implementing digital signature using one time private keys | |
US8775794B2 (en) | System and method for end to end encryption | |
US7900046B2 (en) | System and method for establishing mutual trust on a per-deployment basis between two software modules | |
EP3977675B1 (en) | Systems, methods, and storage media for permissioned delegation in a computing environment | |
US20040073801A1 (en) | Methods and systems for flexible delegation | |
WO2019085531A1 (en) | Method and device for network connection authentication | |
CN106341232A (en) | Anonymous entity identification method based on password | |
CN114036539A (en) | Blockchain-based secure and auditable IoT data sharing system and method | |
US12348620B2 (en) | Method and apparatus for two-step data signing | |
JPH11505384A (en) | Method for computer-assisted exchange of encryption keys between a first computer device and a second computer device | |
Anand et al. | EECDH to prevent MITM attack in cloud computing | |
CN113329003B (en) | An access control method, user equipment and system for the Internet of Things | |
CN118337430A (en) | System, method, device, processor and storage medium for realizing trusted transmission and reverse authorization processing for multiparty interaction data | |
Eisler | LIPKEY-a low infrastructure public key mechanism using SPKM | |
CN111723347B (en) | Identity authentication method, identity authentication device, electronic equipment and storage medium | |
KR100970552B1 (en) | How to generate a security key using a non-certificate public key | |
CN116756780A (en) | Alliance chain data access control method based on CP-ABE algorithm and related equipment | |
US9281947B2 (en) | Security mechanism within a local area network | |
Yang et al. | Generating authentication data without keeping a private key for Mobility | |
CN114005190B (en) | Face recognition method for class attendance system | |
Torrellas et al. | An authentication protocol for agent platform security manager | |
HK40068823A (en) | Systems, methods, and storage media for permissioned delegation in a computing environment |