[go: up one dir, main page]

Martinez-Julia et al., 2010 - Google Patents

Secure identity-to-identity communications over content-centric networking

Martinez-Julia et al., 2010

Document ID
6553374709601388739
Author
Martinez-Julia P
Gomez-Skarmeta A
Publication year
Publication venue
2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and Application

External Links

Snippet

In this paper we propose a novel network architecture to allow secure identity-based communications, which is completely location independent, supports the mobility of communication parties, prevents traceability, and is designed to work over multiple …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0464Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Application independent communication protocol aspects or techniques in packet data networks
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks
    • H04L69/322Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/28Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network
    • H04L67/2823Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network for conversion or adaptation of application content or format
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/28Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network
    • H04L67/2804Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network for adding application control or application functional data, e.g. adding metadata
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Application independent communication protocol aspects or techniques in packet data networks
    • H04L69/08Protocols for interworking or protocol conversion
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0281Proxies

Similar Documents

Publication Publication Date Title
Luecking et al. Decentralized identity and trust management framework for Internet of Things
Hodes et al. An architecture for secure wide-area service discovery
US20110302412A1 (en) Pseudonymous public keys based authentication
Asaf et al. Blockchain technology in named data networks: A detailed survey
Avramidis et al. Chord-PKI: A distributed trust infrastructure based on P2P networks
Aiello et al. Tempering Kademlia with a robust identity based system
Rana et al. Efficient design of an authenticated key agreement protocol for dew-assisted IoT systems
Yang et al. Provably Secure Client‐Server Key Management Scheme in 5G Networks
Martinez-Julia et al. Using identities to achieve enhanced privacy in future content delivery networks
Babu et al. Fog‐Sec: Secure end‐to‐end communication in fog‐enabled IoT network using permissioned blockchain system
Liao Design of the secure smart home system based on the blockchain and cloud service
Aburumman et al. A domain-based multi-cluster SIP solution for mobile ad hoc network
Touceda et al. Attribute-based authorization for structured Peer-to-Peer (P2P) networks
Palomar et al. Secure content access and replication in pure p2p networks
da Costa et al. Securing light clients in blockchain with DLCP
Martinez-Julia et al. A Novel Identity-based Network Architecture for Next Generation Internet.
Martinez-Julia et al. Secure identity-to-identity communications over content-centric networking
Drosatos et al. An efficient privacy-preserving solution for finding the nearest doctor
Meng et al. Establish the intrinsic binding in naming space for future internet using combined public key
Källström et al. A framework for seamless service interworking in ad-hoc networks
Palomar et al. A p2p content authentication protocol based on byzantine agreement
Kim et al. ID‐based group key exchange mechanism for virtual group with microservice
Trabelsi et al. Secure Service Discovery with Distributed Registries
Yu et al. On Empowering End Users in Future Networking
Nassermostofi Authentication in P2P Environment Based on Multi Dimensional Administration Graph