Moldamurat et al., 2024 - Google Patents
Enhancing cryptographic protection, authentication, and authorization in cellular networks: a comprehensive research study.Moldamurat et al., 2024
View PDF- Document ID
- 750819925811270719
- Author
- Moldamurat K
- Seitkulov Y
- Atanov S
- Bakyt M
- Yergaliyeva B
- Publication year
- Publication venue
- International Journal of Electrical & Computer Engineering (2088-8708)
External Links
Snippet
This research article provides an extensive analysis of novel methods of cryptographic protection as well as advancements in authentication and authorization techniques within cellular networks. The aim is to explore recent literature and identify effective authentication …
- 238000013475 authorization 0 title abstract description 21
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0464—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Syed et al. | Zero trust architecture (zta): A comprehensive survey | |
US10205723B2 (en) | Distributed storage of authentication data | |
CN105162772B (en) | A method and device for authentication and key agreement of Internet of Things equipment | |
WO2022262078A1 (en) | Access control method based on zero-trust security, and device and storage medium | |
US10187373B1 (en) | Hierarchical, deterministic, one-time login tokens | |
US9219722B2 (en) | Unclonable ID based chip-to-chip communication | |
US20180176222A1 (en) | User friendly two factor authentication | |
US20180152297A1 (en) | System and Method For Digitally Signing Documents Using Biometric Data in a Blockchain or PKI | |
Moldamurat et al. | Enhancing cryptographic protection, authentication, and authorization in cellular networks: a comprehensive research study. | |
WO2017063163A1 (en) | Apparatus, method and computer program product for authentication | |
Khan et al. | A brief review on cloud computing authentication frameworks | |
Teegala et al. | Enhanced Authentication Methods for Access and Control Management in Cloud Computing | |
Nakouri et al. | A new biometric-based security framework for cloud storage | |
Wei et al. | A provably secure anonymous two-factor authenticated key exchange protocol for cloud computing | |
Roy et al. | A quantum safe user authentication protocol for the internet of things | |
US20250021982A1 (en) | Digital ecosystem with de-centralized secure transactions and edge ai technology to enable privacy preserved zero-id transactions | |
Aiash | A formal analysis of authentication protocols for mobile devices in next generation networks | |
Shukla et al. | A passwordless MFA utilizing biometrics, proximity, and contactless communication | |
Binu et al. | A mobile based remote user authentication scheme without verifier table for cloud based services | |
Uppuluri et al. | Secure multiparty access and authentication based on advanced fuzzy extractor in smart home | |
PRIYA et al. | TRUSTED HYBRID MULTIFACTOR AUTHENTICATION FOR CLOUD USERS. | |
Reddy et al. | Lightweight authenticated key agreement scheme for Cloud-assisted Internet of Things | |
Durak et al. | BioLocker: A practical biometric authentication mechanism based on 3D fingervein | |
Mairaj et al. | Review on Three-Factor Authorization Based on Different IoT Devices | |
Al-Aqrabi et al. | A scalable model for secure multiparty authentication |