Send It Safe - A Novel Application for Secure Key Exchange Using Telecommunications Open Middleware APIs

نویسندگان

  • Piotr Wawrzyniak
  • Lukasz Wronkowski
  • Damian Kuniszewski
  • Adam Cackowski
  • Pawel Czaplinski
  • Karol Szymanski
چکیده

Common surveillance of citizens by various intelligence services every year becomes more dangerous threat to our privacy. Recently, number of security enrichment was developed that allows to increase privacy protection during pervasive network use. In this article we present a novel approach that uses telecommunications OpenMiddleware APIs to provide reliable public key exchange protocol.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Approach for Secure Routing through Bgp Using Symmetric Key

The Border Gateway Protocol (BGP) is the path vector routing protocol that connects different autonomous systems.. These ASes have unique integer numbers which assign by IANA organization. The traditional BGP protocol is not sufficient to provide security and authentication for AS path and verification of AS number ownership as well as network IP prefix. The BGP remains vulnerable to various ty...

متن کامل

Access control in ultra-large-scale systems using a data-centric middleware

  The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...

متن کامل

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

Towards a Technology Agnostic Approach to Developing Mobile Applications and Services

Today’s mobile devices and networks enable the development of novel mobile service applications. Developing such applications raises many challenges including heterogeneity in terms of mobile operating systems and APIs, service availability and scalability, and providing for the diverse communication needs of different applications. In this paper, we present an overview of the Odin middleware p...

متن کامل

Workflow Management Middleware for Secure Distance-Spanning Collaborative Engineering

EXECUTIVE SUMMARY This article presents the E-COLLEG Tool Registration and Management Services (TRMS) with open XML-based data exchange, tool integration and remote invocation capabilities. TRMS is a workflow management middleware tailored to distance spanning engineering collaboration and security enabled data exchange. The infrastructure is validated through two industrial Intranet-crossing c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014