Authentication, identification techniques, and secure containers - Baseline technologies

被引:0
|
作者
Spenger, G [1 ]
机构
[1] Univ Erlangen Nurnberg, Erlangen, Germany
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The commercial distribution of multimedia content over the Internet demands high security mechanisms. There is not only the possibility of third persons intercepting the communication, but also the risk of malevolent hackers faking the identity of registered users. This paper describes mechanisms that prevent such attacks. First an overview of cryptographic algorithms is given. After that the terms identification and authentication are defined and examples of techniques and protocols for user and content authentication are given. The next sections give a short overview of connection based security protocols and the secure container technology used in DRM systems. The final section shows some security aspects of client DRM systems.
引用
收藏
页码:62 / 80
页数:19
相关论文
共 50 条
  • [1] SECURE FPGA TECHNOLOGIES AND TECHNIQUES
    Braeken, An
    Kubera, Serge
    Trouillez, Frederik
    Touhafi, Abdellah
    Mentens, Nele
    Vliegen, Jo
    FPL: 2009 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS, 2009, : 560 - +
  • [2] Technologies for Secure RFID Authentication of Medicinal Pills and Capsules
    Carley, L. Richard
    Colak, Gurkan
    Chomas, Louis
    Pileggi, Larry
    Mai, Kenneth
    2016 IEEE INTERNATIONAL CONFERENCE ON RFID TECHNOLOGY AND APPLICATIONS (RFID-TA), 2016, : 10 - 15
  • [3] Incremental Design of Secure Biometric Identification and Authentication
    Zhou, Linghui
    Oechtering, Tobias J.
    Skoglund, Mikael
    2021 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2021, : 3196 - 3201
  • [4] Microscopy techniques for the identification and authentication of botanicals
    Joshi, Vaishali C.
    Khan, Ikhlas A.
    PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON QUALITY AND SAFETY ISSUES RELATED TO BOTANICALS, 2006, (720): : 73 - 79
  • [5] An Approach for Secure Identification and Authentication for Biometrics using Iris
    Patil, Chandrashekar M.
    Gowda, Sushmitha
    2017 INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN COMPUTER, ELECTRICAL, ELECTRONICS AND COMMUNICATION (CTCEEC), 2017, : 421 - 424
  • [6] Provably secure and efficient authentication techniques for the global mobility network
    Lee, Tian-Fu
    Hwang, Tzonelih
    JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (10) : 1717 - 1725
  • [7] An Improved Dual Authentication Techniques for Secure Data Transmission in VANETs
    Cahyadi, Eko Fajar
    Khair, Fauza
    Amri Ginting, Jafaruddin Gusti
    Ariyadi, Tamsir
    Hwang, Min-Shiang
    Proceeding - International Conference on Information Technology and Computing 2023, ICITCOM 2023, 2023, : 84 - 89
  • [8] Secure authentication and integrity techniques for randomized secured routing in WSN
    U. Senthil kumaran
    P. Ilango
    Wireless Networks, 2015, 21 : 443 - 451
  • [9] Secure authentication and integrity techniques for randomized secured routing in WSN
    Kumaran, U. Senthil
    Ilango, P.
    WIRELESS NETWORKS, 2015, 21 (02) : 443 - 451
  • [10] RAW MATERIALS IDENTIFICATION AND MANUFACTURED PRODUCTS AUTHENTICATION TECHNOLOGIES
    Vafin, R. R.
    Mikhailova, I. Y.
    Semipyatny, V. K.
    Gilmanov, Kh Kh
    Bigaeva, A., V
    Lazareva, E. G.
    NEWS OF THE NATIONAL ACADEMY OF SCIENCES OF THE REPUBLIC OF KAZAKHSTAN-SERIES CHEMISTRY AND TECHNOLOGY, 2020, (06): : 119 - 126