[go: up one dir, main page]

Zugenmaier, 2004 - Google Patents

FLASCHE–a mechanism providing anonymity for mobile users

Zugenmaier, 2004

View PDF
Document ID
3075950893064991949
Author
Zugenmaier A
Publication year
Publication venue
International Workshop on Privacy Enhancing Technologies

External Links

Snippet

The protection goal anonymity helps to preserve the privacy of us ers by ensuring that their identity remains unknown. Many mechanisms ena bling anonymity exist. However, these mechanisms work inefficiently when used in mobile wireless networks. This contribution …
Continue reading at ndl.ethernet.edu.et (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0464Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/164Implementing security features at a particular protocol layer at the network layer

Similar Documents

Publication Publication Date Title
US8606898B1 (en) Spread identity communications architecture
Gruteser et al. Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis
JP3443529B2 (en) Method of providing firewall service and computer system providing firewall service
JP4690480B2 (en) How to provide firewall service
JP3464610B2 (en) Packet verification method
CN1968272B (en) Method used for remitting denial of service attack in communication network and system
Ullrich et al. {IPv6} security: Attacks and countermeasures in a nutshell
Skowyra et al. Have no phear: Networks without identifiers
Herrmann et al. Encdns: A lightweight privacy-preserving name resolution service
Alotaibi et al. Security issues in protocols of TCP/IP model at layers level
Yan et al. The road to DNS privacy
Eid et al. Trends in mobile agent applications
Zugenmaier FLASCHE–a mechanism providing anonymity for mobile users
Hilgenstieler et al. Extensions to the source path isolation engine for precise and efficient log-based IP traceback
Ventura Diameter: Next generations AAA protocol
Rhee Wireless Mobile Internet Security
Kouachi et al. Communication-flow privacy-preservation in 6lowpans-based iot networks
Yu et al. Survey on bridge discovery in tor
Zugenmaier et al. Anonymity for users of ubiquitous computing
Dingledine et al. Challenges in deploying low-latency anonymity (DRAFT)
Smeets et al. Covert channels
Wachs A secure and resilient communication infrastructure for decentralized networking applications
US20070147376A1 (en) Router-assisted DDoS protection by tunneling replicas
Aura et al. Privacy, control and internet mobility
Mathewson et al. Mixminion: Strong anonymity for financial cryptography