Lindqvist et al., 2008 - Google Patents
Protecting privacy with protocol stack virtualizationLindqvist et al., 2008
View PDF- Document ID
- 7327428786777990388
- Author
- Lindqvist J
- Tapio J
- Publication year
- Publication venue
- Proceedings of the 7th ACM workshop on Privacy in the electronic society
External Links
Snippet
Previously proposed host-based privacy protection mechanisms use pseudorandom or disposable identifiers on some or all layers of the protocol stack. These approaches either require changes to all hosts participating in the communication or do not provide privacy for …
- 238000000034 method 0 abstract description 29
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11652792B2 (en) | Endpoint security domain name server agent | |
US8606898B1 (en) | Spread identity communications architecture | |
Davies et al. | IPv6 transition/co-existence security considerations | |
Chiang et al. | ACyDS: An adaptive cyber deception system | |
Ullrich et al. | {IPv6} security: Attacks and countermeasures in a nutshell | |
Krishnan et al. | Security concerns with IP tunneling | |
Skowyra et al. | Have no phear: Networks without identifiers | |
Dawood | IPv6 security vulnerabilities | |
Supriyanto et al. | Survey of internet protocol version 6 link local communication security vulnerability and mitigation methods | |
Petersson et al. | Forwarded HTTP Extension | |
Wang et al. | Random domain name and address mutation (RDAM) for thwarting reconnaissance attacks | |
Gont et al. | Security implications of IPv6 on IPv4 networks | |
US11736516B2 (en) | SSL/TLS spoofing using tags | |
Khurana | A security approach to prevent ARP poisoning and defensive tools | |
Lindqvist et al. | Protecting privacy with protocol stack virtualization | |
Shah et al. | Security Issues in Next Generation IP and Migration Networks | |
Groat et al. | IPv6: nowhere to run, nowhere to hide | |
Wachs | A secure and resilient communication infrastructure for decentralized networking applications | |
Herrera | How Secure is the Next-Generation Internet? An Examination of IPv6. | |
Çalışkan | IPv6 transition and security threat report | |
Hyppönen | Securing a Linux Server Against Cyber Attacks | |
Pahlevan | Signaling and policy enforcement for co-operative firewalls | |
Reddy. K et al. | RFC 9066: Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Channel Call Home | |
Chandrashekar | Cooperative Firewall Signaling over SCION | |
Rafiee et al. | Challenges and Solutions for DNS Security in IPv6 |