Liu et al., 2009 - Google Patents
Security considerations on pervasive real-time collaborationLiu et al., 2009
- Document ID
- 17460381484664174812
- Author
- Liu F
- Koenig H
- Publication year
- Publication venue
- 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems
External Links
Snippet
A real-time pervasive collaboration system enables people to work together on a certain task at anytime and from anyplace. Security is one of the primary concerns for these systems, when running over public networks. In particular, end-to-end security represents a crucial …
- 238000004891 communication 0 description 13
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks
- H04L69/322—Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0464—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L29/00—Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
- H04L29/02—Communication control; Communication processing contains provisionally no documents
- H04L29/06—Communication control; Communication processing contains provisionally no documents characterised by a protocol
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations contains provisionally no documents
- H04L12/18—Arrangements for providing special services to substations contains provisionally no documents for broadcast or conference, e.g. multicast
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9674163B1 (en) | Method for payload encryption of digital voice or data communications | |
KR100832893B1 (en) | A method for the access of the mobile terminal to the WLAN and for the data communication via the wireless link securely | |
EP2437469B1 (en) | Method and apparatus for establishing a security association | |
Asokan et al. | Applicability of identity-based cryptography for disruption-tolerant networking | |
KR101013427B1 (en) | End-to-End Protection of Media Stream Encryption Keys for Voice-Over-IP Systems | |
EP1835652B1 (en) | A method for ensuring the safety of the media-flow in ip multimedia sub-system | |
CN111371730A (en) | Lightweight authentication method supporting anonymous access of heterogeneous terminal in edge computing scene | |
KR20100092989A (en) | Encryption method for secure packet transmission | |
CN100452697C (en) | Conversation key safety distributing method under wireless environment | |
Palmieri et al. | Providing true end-to-end security in converged voice over IP infrastructures | |
Park et al. | Survey for secure IoT group communication | |
Chen et al. | An efficient end-to-end security mechanism for IP multimedia subsystem | |
CN100538588C (en) | Communication system and the method that mobile communication business is provided | |
Mannan et al. | A protocol for secure public instant messaging | |
Xenakis | Security Measures and Weaknesses of the GPRS Security Architecture. | |
Bilien | Key Agreement for secure Voice over IP | |
Lei et al. | Comparative studies on authentication and key exchange methods for 802.11 wireless LAN | |
Moravčík et al. | Survey of real-time multimedia security mechanisms | |
Liu et al. | Security considerations on pervasive real-time collaboration | |
Wu et al. | SOLA: Lightweight security for access control in IEEE 802.11 | |
Naveed Asghar et al. | Key management protocols for secure wireless multimedia services: a review | |
Jung et al. | Using SIP identity to prevent man-in-the-middle attacks on ZRTP | |
Festijo et al. | An open horizontal model for group management and end-to-end security management suitable for group-based private systems | |
Zaghal et al. | Extending AES with DH key-exchange to enhance VoIP encryption in mobile networks | |
Sabra et al. | Using group anonymity to hide the identity of VoIP mobile users communicating over hybrid networks while preserving quality of service |