Dash et al., 2011 - Google Patents
In the Annals of Mobile Database SecurityDash et al., 2011
- Document ID
- 17223385573886581430
- Author
- Dash S
- Jena M
- Publication year
- Publication venue
- CPMR Interntional Journal of Technology
External Links
- 238000005516 engineering process 0 abstract description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/30—Network-specific arrangements or communication protocols supporting networked applications involving profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/04—Network-specific arrangements or communication protocols supporting networked applications adapted for terminals or networks with limited resources or for terminal portability, e.g. wireless application protocol [WAP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/34—Network-specific arrangements or communication protocols supporting networked applications involving the movement of software or configuration parameters
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Lashkari et al. | A survey on wireless security protocols (WEP, WPA and WPA2/802.11 i) | |
| US11233633B2 (en) | Method and system of secured direct link set-up (DLS) for wireless networks | |
| US8467532B2 (en) | System and method for secure transaction of data between a wireless communication device and a server | |
| Frankel et al. | Establishing wireless robust security networks: A guide to IEEE 802.11 i | |
| Dantu et al. | EAP methods for wireless networks | |
| Khasawneh et al. | A survey on Wi-Fi protocols: WPA and WPA2 | |
| Lashkari et al. | Wired equivalent privacy (WEP) versus Wi-Fi protected access (WPA) | |
| US7555128B2 (en) | Systems and methods for the application of cryptosystems to the data link layer of packetized wireless networks | |
| Lackner | A Comparison of Security in Wireless Network Standards with a Focus on Bluetooth, WiFi and WiMAX. | |
| Arana | Benefits and vulnerabilities of Wi-Fi protected access 2 (WPA2) | |
| Juang et al. | Efficient 3GPP authentication and key agreement with robust user privacy protection | |
| Simic et al. | A survey of wireless security | |
| Huang et al. | A secure wireless communication system integrating RSA, Diffie–Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment | |
| Dash et al. | In the Annals of Mobile Database Security | |
| van Oorschot | Wireless lan security: 802.11 and wi-fi | |
| Hecker et al. | Authentis: Through Incremental Authentication Models to Secure Interconnected Wi-Fi WLANs | |
| Haddad et al. | SEPS-AKA: A secure evolved packet system authentication and key agreement scheme for LTE-A networks | |
| Asante et al. | Analysis of security vulnerabilities in wifi-protected access pre-shared key | |
| Xenakis et al. | Security architectures for B3G mobile networks | |
| Ananda Mohan et al. | WiFi Security-A Tutorial | |
| Vafaei | Encryption of 4G mobile broadband systems | |
| Buttyán et al. | WiFi Security–WEP and 802.11 i | |
| Lashkari et al. | A Survey on Wireless Security protocols Wi-Fi (802.11) and WiMAX (802.16) | |
| Oduro et al. | Studying IEEE-802.11 encryption protocol | |
| Frankel et al. | Guide to ieee 802.11 i: Establishing robust security networks |