Secure communication method

作者: Barry A. Kritt , Sarbajit K. Rakshit

DOI:

关键词: Telecommunications networkComputer scienceEncryptionSecure communicationWirelessPublic-key cryptographyWi-FiWireless routerComputer network

摘要: A first computing device receives over a telecommunications network from second verification message encrypted using public key. The is generated by the when initiating call to device. transmits wireless router via local area (WLAN) created router, message. WLAN, decrypted private key associated with device, If determines that corresponds message, allows proceed.

参考文章(19)
Norman Schibuk, Secure Credit Transactions ,(2012)
Richard Esterly, Joel Hendrickson, Timothy Estes, Authenticating the contents of e-documents ,(2001)
Sompong P. Olarig, Michael F. Angelo, Location-based security for a portable computer ,(2001)
Terry M. Olkin, Jahanshah Moreh, Security server system ,(2002)
Yannis Labrou, Jonathan Russell Agre, Authentication services using mobile device ,(2006)
A. Essiari, A. Muratas, K. Berket, PKI-based security for peer-to-peer information sharing international conference on peer-to-peer computing. pp. 45- 52 ,(2004) , 10.1109/P2P.2004.41
Yevgeny Korsunsky, John C. Ferguson, Harsh Kapoor, Charles Ching Lee, Timothy M. Martin, Paul S. Gallo, Weidong Xu, Chunsheng Fu, Moisey Akerman, Stephen D. Justus, Systems and methods for processing data flows ,(2007)
David Victor Badia, Yuliang Zheng, Neil Kevin Kauer, Cryptographic key backup and escrow system ,(2004)