[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Lindqvist et al., 2008 - Google Patents

Protecting privacy with protocol stack virtualization

Lindqvist et al., 2008

View PDF
Document ID
7327428786777990388
Author
Lindqvist J
Tapio J
Publication year
Publication venue
Proceedings of the 7th ACM workshop on Privacy in the electronic society

External Links

Snippet

Previously proposed host-based privacy protection mechanisms use pseudorandom or disposable identifiers on some or all layers of the protocol stack. These approaches either require changes to all hosts participating in the communication or do not provide privacy for …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls

Similar Documents

Publication Publication Date Title
US11652792B2 (en) Endpoint security domain name server agent
US8606898B1 (en) Spread identity communications architecture
Davies et al. IPv6 transition/co-existence security considerations
Chiang et al. ACyDS: An adaptive cyber deception system
Ullrich et al. {IPv6} security: Attacks and countermeasures in a nutshell
Krishnan et al. Security concerns with IP tunneling
Skowyra et al. Have no phear: Networks without identifiers
Dawood IPv6 security vulnerabilities
Supriyanto et al. Survey of internet protocol version 6 link local communication security vulnerability and mitigation methods
Petersson et al. Forwarded HTTP Extension
Wang et al. Random domain name and address mutation (RDAM) for thwarting reconnaissance attacks
Gont et al. Security implications of IPv6 on IPv4 networks
US11736516B2 (en) SSL/TLS spoofing using tags
Khurana A security approach to prevent ARP poisoning and defensive tools
Lindqvist et al. Protecting privacy with protocol stack virtualization
Shah et al. Security Issues in Next Generation IP and Migration Networks
Groat et al. IPv6: nowhere to run, nowhere to hide
Wachs A secure and resilient communication infrastructure for decentralized networking applications
Herrera How Secure is the Next-Generation Internet? An Examination of IPv6.
Çalışkan IPv6 transition and security threat report
Hyppönen Securing a Linux Server Against Cyber Attacks
Pahlevan Signaling and policy enforcement for co-operative firewalls
Reddy. K et al. RFC 9066: Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Channel Call Home
Chandrashekar Cooperative Firewall Signaling over SCION
Rafiee et al. Challenges and Solutions for DNS Security in IPv6