[go: up one dir, main page]

Liu et al., 2009 - Google Patents

Security considerations on pervasive real-time collaboration

Liu et al., 2009

Document ID
17460381484664174812
Author
Liu F
Koenig H
Publication year
Publication venue
2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems

External Links

Snippet

A real-time pervasive collaboration system enables people to work together on a certain task at anytime and from anyplace. Security is one of the primary concerns for these systems, when running over public networks. In particular, end-to-end security represents a crucial …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Application independent communication protocol aspects or techniques in packet data networks
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks
    • H04L69/322Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0464Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L29/00Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
    • H04L29/02Communication control; Communication processing contains provisionally no documents
    • H04L29/06Communication control; Communication processing contains provisionally no documents characterised by a protocol
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations contains provisionally no documents
    • H04L12/18Arrangements for providing special services to substations contains provisionally no documents for broadcast or conference, e.g. multicast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/104Grouping of entities

Similar Documents

Publication Publication Date Title
US9674163B1 (en) Method for payload encryption of digital voice or data communications
KR100832893B1 (en) A method for the access of the mobile terminal to the WLAN and for the data communication via the wireless link securely
EP2437469B1 (en) Method and apparatus for establishing a security association
Asokan et al. Applicability of identity-based cryptography for disruption-tolerant networking
KR101013427B1 (en) End-to-End Protection of Media Stream Encryption Keys for Voice-Over-IP Systems
EP1835652B1 (en) A method for ensuring the safety of the media-flow in ip multimedia sub-system
CN111371730A (en) Lightweight authentication method supporting anonymous access of heterogeneous terminal in edge computing scene
KR20100092989A (en) Encryption method for secure packet transmission
CN100452697C (en) Conversation key safety distributing method under wireless environment
Palmieri et al. Providing true end-to-end security in converged voice over IP infrastructures
Park et al. Survey for secure IoT group communication
Chen et al. An efficient end-to-end security mechanism for IP multimedia subsystem
CN100538588C (en) Communication system and the method that mobile communication business is provided
Mannan et al. A protocol for secure public instant messaging
Xenakis Security Measures and Weaknesses of the GPRS Security Architecture.
Bilien Key Agreement for secure Voice over IP
Lei et al. Comparative studies on authentication and key exchange methods for 802.11 wireless LAN
Moravčík et al. Survey of real-time multimedia security mechanisms
Liu et al. Security considerations on pervasive real-time collaboration
Wu et al. SOLA: Lightweight security for access control in IEEE 802.11
Naveed Asghar et al. Key management protocols for secure wireless multimedia services: a review
Jung et al. Using SIP identity to prevent man-in-the-middle attacks on ZRTP
Festijo et al. An open horizontal model for group management and end-to-end security management suitable for group-based private systems
Zaghal et al. Extending AES with DH key-exchange to enhance VoIP encryption in mobile networks
Sabra et al. Using group anonymity to hide the identity of VoIP mobile users communicating over hybrid networks while preserving quality of service