[go: up one dir, main page]

Køien, 2011 - Google Patents

Privacy enhanced device access

Køien, 2011

Document ID
10430757797206207583
Author
Køien G
Publication year
Publication venue
International Conference on Security and Privacy in Mobile Information and Communication Systems

External Links

Snippet

In this paper we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol and it uses a …
Continue reading at link.springer.com (other versions)

Similar Documents

Publication Publication Date Title
CN111092717B (en) Secure and reliable communication method based on group authentication in smart home environment
JP6492115B2 (en) Encryption key generation
Jo et al. Efficient privacy-preserving authentication in wireless mobile networks
CN101969638B (en) Method for protecting international mobile subscriber identity (IMSI) in mobile communication
Saxena et al. EasySMS: A protocol for end-to-end secure transmission of SMS
JP4723251B2 (en) Secure integration and use of device-specific security data
JP4199074B2 (en) Method and apparatus for secure data communication link
Saxena et al. Authentication protocol for an IoT-enabled LTE network
Tanveer et al. RUAM-IoD: A robust user authentication mechanism for the Internet of Drones
CN106936570A (en) A kind of cipher key configuration method and KMC, network element
CN101822082A (en) Techniques for secure channelization between UICC and terminals
Ma et al. Distributed access control with adaptive privacy preserving property for wireless sensor networks
Chen et al. An authentication scheme with identity‐based cryptography for M2M security in cyber‐physical systems
Shin et al. An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks
Odelu et al. A secure anonymity preserving authentication scheme for roaming service in global mobility networks
Niu et al. A novel user authentication scheme with anonymity for wireless communications
Saxena et al. Lightweight privacy-preserving authentication scheme for V2G networks in the smart grid
Xu et al. Anti-quantum certificateless group authentication for massive accessing IoT devices
Ashraf et al. Robust and lightweight remote user authentication mechanism for next-generation IoT-based smart home
Park et al. JTAG security system based on credentials
Bi et al. Towards Resilience 5G-V2N: Efficient and Privacy-Preserving Authentication Protocol for Multi-Service Access and Handover
Luring et al. Analysis of security features in DLMS/COSEM: Vulnerabilities and countermeasures
KR100984275B1 (en) How to generate a security key using a non-certificate public key on an insecure communication channel
CN106209384B (en) Use the client terminal of security mechanism and the communication authentication method of charging unit
KR100970552B1 (en) How to generate a security key using a non-certificate public key