[go: up one dir, main page]

Yang et al., 2005 - Google Patents

Generating authentication data without keeping a private key for Mobility

Yang et al., 2005

Document ID
6577621805176830298
Author
Yang J
Rhee K
Publication year
Publication venue
11th International Conference on Parallel and Distributed Systems (ICPADS'05)

External Links

Snippet

In the near future, people will wish to access many kinds of heterogeneous networks to use their services anytime and anywhere. Owing to the heterogeneity of networks, there must be many kinds of protocols to guarantee secure services. The mobile device can depend on a …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use

Similar Documents

Publication Publication Date Title
RU2325693C2 (en) Methods of authentication of potentials members, which were invited to join the group
US6766353B1 (en) Method for authenticating a JAVA archive (JAR) for portable devices
EP1714422B1 (en) Establishing a secure context for communicating messages between computer systems
US7689828B2 (en) System and method for implementing digital signature using one time private keys
US8775794B2 (en) System and method for end to end encryption
US7900046B2 (en) System and method for establishing mutual trust on a per-deployment basis between two software modules
EP3977675B1 (en) Systems, methods, and storage media for permissioned delegation in a computing environment
US20040073801A1 (en) Methods and systems for flexible delegation
WO2019085531A1 (en) Method and device for network connection authentication
CN106341232A (en) Anonymous entity identification method based on password
CN114036539A (en) Blockchain-based secure and auditable IoT data sharing system and method
US12348620B2 (en) Method and apparatus for two-step data signing
JPH11505384A (en) Method for computer-assisted exchange of encryption keys between a first computer device and a second computer device
Anand et al. EECDH to prevent MITM attack in cloud computing
CN113329003B (en) An access control method, user equipment and system for the Internet of Things
CN118337430A (en) System, method, device, processor and storage medium for realizing trusted transmission and reverse authorization processing for multiparty interaction data
Eisler LIPKEY-a low infrastructure public key mechanism using SPKM
CN111723347B (en) Identity authentication method, identity authentication device, electronic equipment and storage medium
KR100970552B1 (en) How to generate a security key using a non-certificate public key
CN116756780A (en) Alliance chain data access control method based on CP-ABE algorithm and related equipment
US9281947B2 (en) Security mechanism within a local area network
Yang et al. Generating authentication data without keeping a private key for Mobility
CN114005190B (en) Face recognition method for class attendance system
Torrellas et al. An authentication protocol for agent platform security manager
HK40068823A (en) Systems, methods, and storage media for permissioned delegation in a computing environment