[go: up one dir, main page]

Ananthanarayanan et al., 2006 - Google Patents

Space: Secure protocol for address-book based connection establishment

Ananthanarayanan et al., 2006

View PDF
Document ID
17728858028482491054
Author
Ananthanarayanan G
Venkatesan R
Naldurg P
Blagsvedt S
Hemakumar A
Publication year
Publication venue
IRVINE IS BURNING

External Links

Snippet

We present SPACE an application-level protocol for secure automatic ad-hoc connection- establishment between two devices based on their address book entries. Our protocol is based on the simple premise that if two people have each others contact details in their …
Continue reading at nyunetworks.github.io (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0869Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network for achieving mutual authentication

Similar Documents

Publication Publication Date Title
US8352739B2 (en) Two-factor authenticated key exchange method and authentication method using the same, and recording medium storing program including the same
TWI394466B (en) Secure bootstrapping for wireless communications
CN110234111B (en) A Two-Factor Authentication Key Agreement Protocol for Multi-Gateway Wireless Sensor Networks
JP5579872B2 (en) Secure multiple UIM authentication and key exchange
WO2017201809A1 (en) Communication method and system for terminal
CN109075973A (en) A kind of method that use is carried out network and serviced unified certification based on the cryptography of ID
Niu et al. A novel user authentication scheme with anonymity for wireless communications
Kumar et al. A conditional privacy-preserving and desynchronization-resistant authentication protocol for vehicular ad hoc network
Juang et al. Efficient 3GPP authentication and key agreement with robust user privacy protection
Huang et al. A secure wireless communication system integrating RSA, Diffie–Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment
Zhu Cryptanalysis and improvement of a mobile dynamic ID authenticated key agreement scheme based on chaotic maps
Ananthanarayanan et al. Space: Secure protocol for address-book based connection establishment
Tian et al. A Security-Enhanced Certificateless Anonymous Authentication Scheme with High Computational Efficiency for Mobile Edge Computing
Lee Bluetooth security protocol analysis and improvements
Jain et al. SAP: a low-latency protocol for mitigating evil twin attacks and high computation overhead in WI-FI networks
Stirparo et al. Bluetooth technology: security features, vulnerabilities and attacks
Naga Nithin An Efficient and Secure Mechanism for Ubiquitous Sustainable Computing System
Wang et al. SP 2-RD2D: Secure and Privacy-Preserving Authentication and Key Agreement Protocol for D2D Relay Communication
Nilsson et al. Unidirectional auxiliary channel challenge-response authentication
Milutinovic et al. Secure negotiation for manual authentication protocols
Londe et al. A new lightweight eap-pk authentication method for ieee 802. 11 standard wireless network
Mendoza An enhanced method for the existing Bluetooth pairing protocol to avoid impersonation attacks
Mustafa et al. Dynamic Authentication Protocol for Mobile Networks Using Public-Key Cryptography
Schirninger et al. Wireless On-Board Diagnostics
SIDDIQUEE Bluetooth Security Risks and Mitigation in wireless networks