Ananthanarayanan et al., 2006 - Google Patents
Space: Secure protocol for address-book based connection establishmentAnanthanarayanan et al., 2006
View PDF- Document ID
- 17728858028482491054
- Author
- Ananthanarayanan G
- Venkatesan R
- Naldurg P
- Blagsvedt S
- Hemakumar A
- Publication year
- Publication venue
- IRVINE IS BURNING
External Links
Snippet
We present SPACE an application-level protocol for secure automatic ad-hoc connection- establishment between two devices based on their address book entries. Our protocol is based on the simple premise that if two people have each others contact details in their …
- 238000000034 method 0 abstract description 11
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0869—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network for achieving mutual authentication
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8352739B2 (en) | Two-factor authenticated key exchange method and authentication method using the same, and recording medium storing program including the same | |
TWI394466B (en) | Secure bootstrapping for wireless communications | |
CN110234111B (en) | A Two-Factor Authentication Key Agreement Protocol for Multi-Gateway Wireless Sensor Networks | |
JP5579872B2 (en) | Secure multiple UIM authentication and key exchange | |
WO2017201809A1 (en) | Communication method and system for terminal | |
CN109075973A (en) | A kind of method that use is carried out network and serviced unified certification based on the cryptography of ID | |
Niu et al. | A novel user authentication scheme with anonymity for wireless communications | |
Kumar et al. | A conditional privacy-preserving and desynchronization-resistant authentication protocol for vehicular ad hoc network | |
Juang et al. | Efficient 3GPP authentication and key agreement with robust user privacy protection | |
Huang et al. | A secure wireless communication system integrating RSA, Diffie–Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment | |
Zhu | Cryptanalysis and improvement of a mobile dynamic ID authenticated key agreement scheme based on chaotic maps | |
Ananthanarayanan et al. | Space: Secure protocol for address-book based connection establishment | |
Tian et al. | A Security-Enhanced Certificateless Anonymous Authentication Scheme with High Computational Efficiency for Mobile Edge Computing | |
Lee | Bluetooth security protocol analysis and improvements | |
Jain et al. | SAP: a low-latency protocol for mitigating evil twin attacks and high computation overhead in WI-FI networks | |
Stirparo et al. | Bluetooth technology: security features, vulnerabilities and attacks | |
Naga Nithin | An Efficient and Secure Mechanism for Ubiquitous Sustainable Computing System | |
Wang et al. | SP 2-RD2D: Secure and Privacy-Preserving Authentication and Key Agreement Protocol for D2D Relay Communication | |
Nilsson et al. | Unidirectional auxiliary channel challenge-response authentication | |
Milutinovic et al. | Secure negotiation for manual authentication protocols | |
Londe et al. | A new lightweight eap-pk authentication method for ieee 802. 11 standard wireless network | |
Mendoza | An enhanced method for the existing Bluetooth pairing protocol to avoid impersonation attacks | |
Mustafa et al. | Dynamic Authentication Protocol for Mobile Networks Using Public-Key Cryptography | |
Schirninger et al. | Wireless On-Board Diagnostics | |
SIDDIQUEE | Bluetooth Security Risks and Mitigation in wireless networks |