[go: up one dir, main page]

Moldamurat et al., 2024 - Google Patents

Enhancing cryptographic protection, authentication, and authorization in cellular networks: a comprehensive research study.

Moldamurat et al., 2024

View PDF
Document ID
750819925811270719
Author
Moldamurat K
Seitkulov Y
Atanov S
Bakyt M
Yergaliyeva B
Publication year
Publication venue
International Journal of Electrical & Computer Engineering (2088-8708)

External Links

Snippet

This research article provides an extensive analysis of novel methods of cryptographic protection as well as advancements in authentication and authorization techniques within cellular networks. The aim is to explore recent literature and identify effective authentication …
Continue reading at core.ac.uk (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0464Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it

Similar Documents

Publication Publication Date Title
Syed et al. Zero trust architecture (zta): A comprehensive survey
US10205723B2 (en) Distributed storage of authentication data
CN105162772B (en) A method and device for authentication and key agreement of Internet of Things equipment
WO2022262078A1 (en) Access control method based on zero-trust security, and device and storage medium
US10187373B1 (en) Hierarchical, deterministic, one-time login tokens
US9219722B2 (en) Unclonable ID based chip-to-chip communication
US20180176222A1 (en) User friendly two factor authentication
US20180152297A1 (en) System and Method For Digitally Signing Documents Using Biometric Data in a Blockchain or PKI
Moldamurat et al. Enhancing cryptographic protection, authentication, and authorization in cellular networks: a comprehensive research study.
WO2017063163A1 (en) Apparatus, method and computer program product for authentication
Khan et al. A brief review on cloud computing authentication frameworks
Teegala et al. Enhanced Authentication Methods for Access and Control Management in Cloud Computing
Nakouri et al. A new biometric-based security framework for cloud storage
Wei et al. A provably secure anonymous two-factor authenticated key exchange protocol for cloud computing
Roy et al. A quantum safe user authentication protocol for the internet of things
US20250021982A1 (en) Digital ecosystem with de-centralized secure transactions and edge ai technology to enable privacy preserved zero-id transactions
Aiash A formal analysis of authentication protocols for mobile devices in next generation networks
Shukla et al. A passwordless MFA utilizing biometrics, proximity, and contactless communication
Binu et al. A mobile based remote user authentication scheme without verifier table for cloud based services
Uppuluri et al. Secure multiparty access and authentication based on advanced fuzzy extractor in smart home
PRIYA et al. TRUSTED HYBRID MULTIFACTOR AUTHENTICATION FOR CLOUD USERS.
Reddy et al. Lightweight authenticated key agreement scheme for Cloud-assisted Internet of Things
Durak et al. BioLocker: A practical biometric authentication mechanism based on 3D fingervein
Mairaj et al. Review on Three-Factor Authorization Based on Different IoT Devices
Al-Aqrabi et al. A scalable model for secure multiparty authentication