Authentication, identification techniques, and secure containers - Baseline technologies

被引:0
|
作者
Spenger, G [1 ]
机构
[1] Univ Erlangen Nurnberg, Erlangen, Germany
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The commercial distribution of multimedia content over the Internet demands high security mechanisms. There is not only the possibility of third persons intercepting the communication, but also the risk of malevolent hackers faking the identity of registered users. This paper describes mechanisms that prevent such attacks. First an overview of cryptographic algorithms is given. After that the terms identification and authentication are defined and examples of techniques and protocols for user and content authentication are given. The next sections give a short overview of connection based security protocols and the secure container technology used in DRM systems. The final section shows some security aspects of client DRM systems.
引用
收藏
页码:62 / 80
页数:19
相关论文
共 50 条
  • [31] Passhint: Memorable and Secure Authentication
    Chowdhury, Soumyadeb
    Poet, Ron
    Mackenzie, Lewis
    32ND ANNUAL ACM CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI 2014), 2014, : 2917 - 2926
  • [32] Continuous Authentication in Secure Messaging
    Dowling, Benjamin
    Günther, Felix
    Poirrier, Alexandre
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2022, 13555 LNCS : 361 - 381
  • [33] Unconditionally Secure Group Authentication
    Van Dijk M.
    Gehrmann C.
    Smeets B.
    Designs, Codes and Cryptography, 1998, 14 (3) : 281 - 296
  • [34] Role authentication for secure DBMS
    Ryoo, D
    Kim, S
    Jun, M
    SAM '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2005, : 304 - 310
  • [35] Highly Secure Authentication Scheme
    Narhar, Ushir Kishori
    Joshi, Ram B.
    1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 270 - 274
  • [36] Unconditionally secure entity authentication
    Kurosawa, K
    1998 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 1998, : 298 - 298
  • [37] (In)secure Acoustic Mobile Authentication
    Han, Dianqi
    Li, Ang
    Li, Tao
    Zhang, Lili
    Zhang, Yan
    Li, Jiawei
    Zhang, Rui
    Zhang, Yanchao
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 21 (09) : 3193 - 3207
  • [38] Secure Computation Without Authentication
    Boaz Barak
    Ran Canetti
    Yehuda Lindell
    Rafael Pass
    Tal Rabin
    Journal of Cryptology, 2011, 24 : 720 - 760
  • [39] Secure computation without authentication
    Barak, B
    Canetti, R
    Lindell, Y
    Pass, R
    Rabin, T
    ADVANCES IN CRYPTOLOGY - CRYPTO 2005, PROCEEDINGS, 2005, 3621 : 361 - 377
  • [40] Secure Authentication on the Internet of Things
    Griffin, Phillip H.
    SOUTHEASTCON 2017, 2017,