Authentication, identification techniques, and secure containers - Baseline technologies

被引:0
|
作者
Spenger, G [1 ]
机构
[1] Univ Erlangen Nurnberg, Erlangen, Germany
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The commercial distribution of multimedia content over the Internet demands high security mechanisms. There is not only the possibility of third persons intercepting the communication, but also the risk of malevolent hackers faking the identity of registered users. This paper describes mechanisms that prevent such attacks. First an overview of cryptographic algorithms is given. After that the terms identification and authentication are defined and examples of techniques and protocols for user and content authentication are given. The next sections give a short overview of connection based security protocols and the secure container technology used in DRM systems. The final section shows some security aspects of client DRM systems.
引用
收藏
页码:62 / 80
页数:19
相关论文
共 50 条
  • [21] Secure and Transparent Craftwork Authentication and Transaction System: Integrating Digital Fingerprinting and Blockchain Technologies
    Yi, Ji Hyun
    Moon, Jinsoo
    APPLIED SCIENCES-BASEL, 2024, 14 (19):
  • [22] The Authentication Game - Secure User Authentication by Gamification?
    Ebbers, Frank
    Brune, Philipp
    ADVANCED INFORMATION SYSTEMS ENGINEERING (CAISE 2016), 2016, 9694 : 101 - 115
  • [23] Secure Namespaced Kernel Audit for Containers
    Lim, Soo Yee
    Stelea, Bogdan
    Han, Xueyuan
    Pasquier, Thomas
    PROCEEDINGS OF THE 2021 ACM SYMPOSIUM ON CLOUD COMPUTING (SOCC '21), 2021, : 518 - 532
  • [24] Network Authentication, Identification, and Secure Communication through Optical Physical Unclonable Function
    Goki, Pantea Nadimi
    Mulugeta, Thomas Teferi
    Sambo, Nicola
    Poti, Luca
    2022 EUROPEAN CONFERENCE ON OPTICAL COMMUNICATION (ECOC), 2022,
  • [25] HOW TO SECURE LOADS IN FREIGHT CONTAINERS
    HARDIE, C
    MECHANICAL HANDLING, 1969, 56 (07): : 63 - &
  • [26] SynAPTIC: Secure And Persistent connecTIvity for Containers
    Ranjbar, Alireza
    Komu, Miika
    Salmela, Patrik
    Aura, Tuomas
    2017 17TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID), 2017, : 262 - 267
  • [27] "If It Wasn't Secure, They Would Not Use It in the Movies" - Security Perceptions and User Acceptance of Authentication Technologies
    Zimmermann, Verena
    Gerber, Nina
    HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY AND TRUST (HAS 2017), 2017, 10292 : 265 - 283
  • [28] Comparative Analysis of Authentication Techniques to Secure Low Level Reader Protocol (LLRP) Connection
    ELshrief, Shreen. Abd ELfatah.
    Sadek, Rowayda. A.
    Ghalwash, Atef.
    2014 31ST NATIONAL RADIO SCIENCE CONFERENCE (NRSC), 2014, : 73 - 81
  • [29] Secure Internet banking authentication
    Hiltgen, A
    Kramp, T
    Weigold, T
    IEEE SECURITY & PRIVACY, 2006, 4 (02) : 21 - 29
  • [30] A technique for secure image authentication
    Izquierdo, E
    PROCEEDINGS ELMAR-2004: 46TH INTERNATIONAL SYMPOSIUM ELECTRONICS IN MARINE, 2004, : 67 - 73