Patrikakis et al., 2009 - Google Patents
Trust and security in Personal Network environmentsPatrikakis et al., 2009
- Document ID
- 2714959596539129387
- Author
- Patrikakis C
- Kyriazanos D
- Voulodimos A
- Nikolakopoulos I
- Publication year
- Publication venue
- International Journal of Electronic Security and Digital Forensics
External Links
Snippet
The rapid growth of personal communications has increased the need for user interaction and communication in a Peer-to-Peer (P2P) fashion together with the need for protection against security threats and the corresponding need for trust establishment schemes. In this …
- 238000011160 research 0 abstract description 13
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0827—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0464—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
- H04L9/0858—Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liu et al. | A survey on secure data analytics in edge computing | |
Abdullah et al. | CyberSecurity: a review of internet of things (IoT) security issues, challenges and techniques | |
Tuna et al. | A survey on information security threats and solutions for Machine to Machine (M2M) communications | |
US12058122B2 (en) | Password concatenation for secure command execution in a secure network device | |
Jabraeil Jamali et al. | IoT security | |
Farhadi et al. | A systematic approach toward security in Fog computing: Assets, vulnerabilities, possible countermeasures | |
Alfaqih et al. | Internet of things security based on devices architecture | |
Azeez et al. | Grid security loopholes with proposed countermeasures | |
Anjum et al. | Analysis of security threats, attacks in the Internet of Things | |
Li | Security architecture in the internet of things | |
Talwar et al. | Encryption Policies of Social Media Apps and Its Effect on User's Privacy | |
Alexander | Using linear regression analysis and defense in depth to protect networks during the global corona pandemic | |
CN117240465A (en) | Zero-trust security unified analysis and evaluation and trusted access method for Internet of things | |
Patrikakis et al. | Trust and security in Personal Network environments | |
Tabassam et al. | Social Netwoks and Digital Security | |
Al-Shebami et al. | Wireless LAN security | |
Gomez et al. | Hands-on lab on smart city vulnerability exploitation | |
Park et al. | Active access control (AAC) with fine‐granularity and scalability | |
Kocher | A Systematic Roadmap on Privacy, Security, Trust, Identity Management, and Resilience: Wireless Sensor Networks and Internet of Things Architectures | |
Mattioli | The States (s) of Cybersecurity | |
Durresi et al. | Security Based Cyber-Physical Architecture for Environment Protection | |
Opyrchal et al. | Designing a publish-subscribe substrate for privacy/security in pervasive environments | |
Makkonen | Investigation on Security Improvements for Open Radio Access Networks | |
Giannotti et al. | Privacy and security in ubiquitous knowledge discovery | |
Ndichu et al. | A Review of Security Vulnerabilities, Controls and Models in Networked Environments |