2009
DOI: 10.1007/978-3-642-02617-1_77
|View full text |Cite
|
Sign up to set email alerts
|

Device Authentication/Authorization Protocol for Home Network in Next Generation Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2010
2010
2013
2013

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…Also, when a service is provided by a sub-device with insufficient computation capability and computing power, if a main device issues a sub-device authentication ticket from the internal office authentication server and divides it, the sub-device has a ticket and receives an office network service. By this means, a simpler ID-based authentication/authorization method can be implemented, thus, safety and efficiency can be provided [7].…”
Section: B S/key-based Home Device Authenticationmentioning
confidence: 99%
See 2 more Smart Citations
“…Also, when a service is provided by a sub-device with insufficient computation capability and computing power, if a main device issues a sub-device authentication ticket from the internal office authentication server and divides it, the sub-device has a ticket and receives an office network service. By this means, a simpler ID-based authentication/authorization method can be implemented, thus, safety and efficiency can be provided [7].…”
Section: B S/key-based Home Device Authenticationmentioning
confidence: 99%
“…RELATED WORK This section describes existing home networks as well as their characteristics and advantages/ disadvantages [7].…”
Section: ) Requirements Of Office Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…Some of them with representatives can be listed as follows. Singh, Manpreet [2,3] demonstrates the use of formal methods for to design a formal specification framework corresponding to the security model defined for network system and the formal specification language is used for developing the framework to provide a simplified exposition of integrated rules, without allowing the formal notation. Oh, Tae Hwan [4,5] consider the network security issues of cloud computing as mandatory prior to real world service, survey and issues on the network security in cloud computing are discussed from the perspective of real world service environments.…”
Section: Related Workmentioning
confidence: 99%
“…Device authentication/authorization protocol proposed in [8] offer roaming service that make clients to able to access external home network as well as inter home net-work by using synchronization value and public key encryption method made with secret key and device ID. However, it is no way to change a public key and private key made device ID.…”
Section: Related Workmentioning
confidence: 99%