Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- D3.1: Overview on IMS.
- D3.2: A study on PKI and biometrics.
- D3.3: Study on Mobile Identity Management.
- D3.5: Workshop on ID-Documents.
- D3.6: Study on ID Documents.
- D3.7: A Structured Collection on RFID Literature.
- D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
- D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
- D3.10: Biometrics in identity management.
- D3.11: Report on the Maintenance of the IMS Database.
- D3.15: Report on the Maintenance of the ISM Database.
- D3.17: Identity Management Systems – recent developments.
- D12.1: Integrated Workshop on Emerging AmI Technologies.
- D12.2: Study on Emerging AmI Technologies.
- D12.3: A Holistic Privacy Framework for RFID Applications.
- D12.4: Integrated Workshop on Emerging AmI.
- D12.5: Use cases and scenarios of emerging technologies.
- D12.6: A Study on ICT Implants.
- D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
- D12.10: Normality Mining: Results from a Tracking Study.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication
Appendices
List of Figures
Figure 1: Example illustrating the involved layers of the TCP/IP model on various stages of and end-to-end communication 8
Figure 2: Example illustrating the protocols involved in an e-mail transmission 14
Figure 3: Architecture of the Domain Name System 17
Figure 4: Sample DNS query 17
Figure 5: Encryption of the RTP payload 22
Figure 6: RTCP encryption 23
Figure 7: Three-way handshake in TCP 24
Figure 8: TLS handshake protocol (“*” marks optional fields) 26
Figure 9: Illustration of the TLS hop-by-hop protection 26
Figure 10: UDP data transfer 27
Figure 11: Data encapsulation over the four layers 31
Figure 12: Subnet with three hosts connected to the Internet by a router 31
Figure 13: The extension header (the middle fields (green)) of IPv6 34
Figure 14: Packet structure of IPSec ESP packets in transport and tunnel mode 37
Figure 15: Illustration of an Ethernet frame with a change of MAC addresses 39
Figure 16: ADSL communication between client and ISP 41
Figure 17: A schematic of the most common components of a wireless LAN 42
Figure 18: Layers as they are covered by the 802.11 resp. 802.2 protocol suites 43
Figure 19: Components of a cable network with Internet access 52
Figure 20: Basic principle of Mixes 56
Figure 21: AN.ON architecture 57
Figure 22: User interface of JAP 58
Figure 23: Pseudonym types 60
Figure 24: Web single sign-on 69
Figure 25: SAML components 69
schulte | 28 / 30 |