Zugenmaier, 2004 - Google Patents
FLASCHE–a mechanism providing anonymity for mobile usersZugenmaier, 2004
View PDF- Document ID
- 3075950893064991949
- Author
- Zugenmaier A
- Publication year
- Publication venue
- International Workshop on Privacy Enhancing Technologies
External Links
Snippet
The protection goal anonymity helps to preserve the privacy of us ers by ensuring that their identity remains unknown. Many mechanisms ena bling anonymity exist. However, these mechanisms work inefficiently when used in mobile wireless networks. This contribution …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0464—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/164—Implementing security features at a particular protocol layer at the network layer
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8606898B1 (en) | Spread identity communications architecture | |
Gruteser et al. | Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis | |
JP3443529B2 (en) | Method of providing firewall service and computer system providing firewall service | |
JP4690480B2 (en) | How to provide firewall service | |
JP3464610B2 (en) | Packet verification method | |
CN1968272B (en) | Method used for remitting denial of service attack in communication network and system | |
Ullrich et al. | {IPv6} security: Attacks and countermeasures in a nutshell | |
Skowyra et al. | Have no phear: Networks without identifiers | |
Herrmann et al. | Encdns: A lightweight privacy-preserving name resolution service | |
Alotaibi et al. | Security issues in protocols of TCP/IP model at layers level | |
Yan et al. | The road to DNS privacy | |
Eid et al. | Trends in mobile agent applications | |
Zugenmaier | FLASCHE–a mechanism providing anonymity for mobile users | |
Hilgenstieler et al. | Extensions to the source path isolation engine for precise and efficient log-based IP traceback | |
Ventura | Diameter: Next generations AAA protocol | |
Rhee | Wireless Mobile Internet Security | |
Kouachi et al. | Communication-flow privacy-preservation in 6lowpans-based iot networks | |
Yu et al. | Survey on bridge discovery in tor | |
Zugenmaier et al. | Anonymity for users of ubiquitous computing | |
Dingledine et al. | Challenges in deploying low-latency anonymity (DRAFT) | |
Smeets et al. | Covert channels | |
Wachs | A secure and resilient communication infrastructure for decentralized networking applications | |
US20070147376A1 (en) | Router-assisted DDoS protection by tunneling replicas | |
Aura et al. | Privacy, control and internet mobility | |
Mathewson et al. | Mixminion: Strong anonymity for financial cryptography |