Køien, 2011 - Google Patents
Privacy enhanced device accessKøien, 2011
- Document ID
- 10430757797206207583
- Author
- Køien G
- Publication year
- Publication venue
- International Conference on Security and Privacy in Mobile Information and Communication Systems
External Links
Snippet
In this paper we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol and it uses a …
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111092717B (en) | Secure and reliable communication method based on group authentication in smart home environment | |
JP6492115B2 (en) | Encryption key generation | |
Jo et al. | Efficient privacy-preserving authentication in wireless mobile networks | |
CN101969638B (en) | Method for protecting international mobile subscriber identity (IMSI) in mobile communication | |
Saxena et al. | EasySMS: A protocol for end-to-end secure transmission of SMS | |
JP4723251B2 (en) | Secure integration and use of device-specific security data | |
JP4199074B2 (en) | Method and apparatus for secure data communication link | |
Saxena et al. | Authentication protocol for an IoT-enabled LTE network | |
Tanveer et al. | RUAM-IoD: A robust user authentication mechanism for the Internet of Drones | |
CN106936570A (en) | A kind of cipher key configuration method and KMC, network element | |
CN101822082A (en) | Techniques for secure channelization between UICC and terminals | |
Ma et al. | Distributed access control with adaptive privacy preserving property for wireless sensor networks | |
Chen et al. | An authentication scheme with identity‐based cryptography for M2M security in cyber‐physical systems | |
Shin et al. | An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks | |
Odelu et al. | A secure anonymity preserving authentication scheme for roaming service in global mobility networks | |
Niu et al. | A novel user authentication scheme with anonymity for wireless communications | |
Saxena et al. | Lightweight privacy-preserving authentication scheme for V2G networks in the smart grid | |
Xu et al. | Anti-quantum certificateless group authentication for massive accessing IoT devices | |
Ashraf et al. | Robust and lightweight remote user authentication mechanism for next-generation IoT-based smart home | |
Park et al. | JTAG security system based on credentials | |
Bi et al. | Towards Resilience 5G-V2N: Efficient and Privacy-Preserving Authentication Protocol for Multi-Service Access and Handover | |
Luring et al. | Analysis of security features in DLMS/COSEM: Vulnerabilities and countermeasures | |
KR100984275B1 (en) | How to generate a security key using a non-certificate public key on an insecure communication channel | |
CN106209384B (en) | Use the client terminal of security mechanism and the communication authentication method of charging unit | |
KR100970552B1 (en) | How to generate a security key using a non-certificate public key |