[go: up one dir, main page]

Patrikakis et al., 2009 - Google Patents

Trust and security in Personal Network environments

Patrikakis et al., 2009

Document ID
2714959596539129387
Author
Patrikakis C
Kyriazanos D
Voulodimos A
Nikolakopoulos I
Publication year
Publication venue
International Journal of Electronic Security and Digital Forensics

External Links

Snippet

The rapid growth of personal communications has increased the need for user interaction and communication in a Peer-to-Peer (P2P) fashion together with the need for protection against security threats and the corresponding need for trust establishment schemes. In this …
Continue reading at www.inderscienceonline.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0827Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0464Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0858Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding

Similar Documents

Publication Publication Date Title
Liu et al. A survey on secure data analytics in edge computing
Abdullah et al. CyberSecurity: a review of internet of things (IoT) security issues, challenges and techniques
Tuna et al. A survey on information security threats and solutions for Machine to Machine (M2M) communications
US12058122B2 (en) Password concatenation for secure command execution in a secure network device
Jabraeil Jamali et al. IoT security
Farhadi et al. A systematic approach toward security in Fog computing: Assets, vulnerabilities, possible countermeasures
Alfaqih et al. Internet of things security based on devices architecture
Azeez et al. Grid security loopholes with proposed countermeasures
Anjum et al. Analysis of security threats, attacks in the Internet of Things
Li Security architecture in the internet of things
Talwar et al. Encryption Policies of Social Media Apps and Its Effect on User's Privacy
Alexander Using linear regression analysis and defense in depth to protect networks during the global corona pandemic
CN117240465A (en) Zero-trust security unified analysis and evaluation and trusted access method for Internet of things
Patrikakis et al. Trust and security in Personal Network environments
Tabassam et al. Social Netwoks and Digital Security
Al-Shebami et al. Wireless LAN security
Gomez et al. Hands-on lab on smart city vulnerability exploitation
Park et al. Active access control (AAC) with fine‐granularity and scalability
Kocher A Systematic Roadmap on Privacy, Security, Trust, Identity Management, and Resilience: Wireless Sensor Networks and Internet of Things Architectures
Mattioli The States (s) of Cybersecurity
Durresi et al. Security Based Cyber-Physical Architecture for Environment Protection
Opyrchal et al. Designing a publish-subscribe substrate for privacy/security in pervasive environments
Makkonen Investigation on Security Improvements for Open Radio Access Networks
Giannotti et al. Privacy and security in ubiquitous knowledge discovery
Ndichu et al. A Review of Security Vulnerabilities, Controls and Models in Networked Environments