Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by France Telecom, Claire Duranton, Magalie Crassous, Lionel MorandfiledCriticalFrance Telecom
Publication of WO2007012786A2publicationCriticalpatent/WO2007012786A2/en
Publication of WO2007012786A3publicationCriticalpatent/WO2007012786A3/en
H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
H04L63/00—Network architectures or network communication protocols for network security
H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
H—ELECTRICITY
H04—ELECTRIC COMMUNICATION TECHNIQUE
H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
H—ELECTRICITY
H04—ELECTRIC COMMUNICATION TECHNIQUE
H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
H—ELECTRICITY
H04—ELECTRIC COMMUNICATION TECHNIQUE
H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
H04L63/00—Network architectures or network communication protocols for network security
H04L63/16—Implementing security features at a particular protocol layer
H04L63/162—Implementing security features at a particular protocol layer at the data link layer
Provision of security services for a mobile "Ad-Hoc" Network
Non-Patent Citations (1)
* Cited by examiner, † Cited by third party
Title
LEE JONG-HOON ; PARK HO JIN: "A user authentication protocol using EAP for mobile ad hoc networks", PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORK, AND INFORMATION SECURITY; PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON COMMUNICATION, 10 December 2003 (2003-12-10), New York, pages 38 - 42, XP009065406, ISBN: 0-88986-402-0*