Martinez-Julia et al., 2010 - Google Patents
Secure identity-to-identity communications over content-centric networkingMartinez-Julia et al., 2010
- Document ID
- 6553374709601388739
- Author
- Martinez-Julia P
- Gomez-Skarmeta A
- Publication year
- Publication venue
- 2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and Application
External Links
Snippet
In this paper we propose a novel network architecture to allow secure identity-based communications, which is completely location independent, supports the mobility of communication parties, prevents traceability, and is designed to work over multiple …
- 238000004891 communication 0 abstract description 17
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0464—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks
- H04L69/322—Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/28—Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network
- H04L67/2823—Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network for conversion or adaptation of application content or format
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/28—Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network
- H04L67/2804—Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network for adding application control or application functional data, e.g. adding metadata
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
- H04L69/08—Protocols for interworking or protocol conversion
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0281—Proxies
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Luecking et al. | Decentralized identity and trust management framework for Internet of Things | |
Hodes et al. | An architecture for secure wide-area service discovery | |
US20110302412A1 (en) | Pseudonymous public keys based authentication | |
Asaf et al. | Blockchain technology in named data networks: A detailed survey | |
Avramidis et al. | Chord-PKI: A distributed trust infrastructure based on P2P networks | |
Aiello et al. | Tempering Kademlia with a robust identity based system | |
Rana et al. | Efficient design of an authenticated key agreement protocol for dew-assisted IoT systems | |
Yang et al. | Provably Secure Client‐Server Key Management Scheme in 5G Networks | |
Martinez-Julia et al. | Using identities to achieve enhanced privacy in future content delivery networks | |
Babu et al. | Fog‐Sec: Secure end‐to‐end communication in fog‐enabled IoT network using permissioned blockchain system | |
Liao | Design of the secure smart home system based on the blockchain and cloud service | |
Aburumman et al. | A domain-based multi-cluster SIP solution for mobile ad hoc network | |
Touceda et al. | Attribute-based authorization for structured Peer-to-Peer (P2P) networks | |
Palomar et al. | Secure content access and replication in pure p2p networks | |
da Costa et al. | Securing light clients in blockchain with DLCP | |
Martinez-Julia et al. | A Novel Identity-based Network Architecture for Next Generation Internet. | |
Martinez-Julia et al. | Secure identity-to-identity communications over content-centric networking | |
Drosatos et al. | An efficient privacy-preserving solution for finding the nearest doctor | |
Meng et al. | Establish the intrinsic binding in naming space for future internet using combined public key | |
Källström et al. | A framework for seamless service interworking in ad-hoc networks | |
Palomar et al. | A p2p content authentication protocol based on byzantine agreement | |
Kim et al. | ID‐based group key exchange mechanism for virtual group with microservice | |
Trabelsi et al. | Secure Service Discovery with Distributed Registries | |
Yu et al. | On Empowering End Users in Future Networking | |
Nassermostofi | Authentication in P2P Environment Based on Multi Dimensional Administration Graph |