Authentication, identification techniques, and secure containers - Baseline technologies

被引:0
|
作者
Spenger, G [1 ]
机构
[1] Univ Erlangen Nurnberg, Erlangen, Germany
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The commercial distribution of multimedia content over the Internet demands high security mechanisms. There is not only the possibility of third persons intercepting the communication, but also the risk of malevolent hackers faking the identity of registered users. This paper describes mechanisms that prevent such attacks. First an overview of cryptographic algorithms is given. After that the terms identification and authentication are defined and examples of techniques and protocols for user and content authentication are given. The next sections give a short overview of connection based security protocols and the secure container technology used in DRM systems. The final section shows some security aspects of client DRM systems.
引用
收藏
页码:62 / 80
页数:19
相关论文
共 50 条
  • [41] Continuous Authentication in Secure Messaging
    Dowling, Benjamin
    Gunther, Felix
    Poirrier, Alexandre
    COMPUTER SECURITY - ESORICS 2022, PT II, 2022, 13555 : 361 - 381
  • [42] A Secure Authentication Scheme for MobiCloud
    Donald, A. Cecil
    Arockiam, L.
    2015 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2015,
  • [43] Secure authentication for face recognition
    Dabbah, M. A.
    Woo, W. L.
    Dlay, S. S.
    2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE IN IMAGE AND SIGNAL PROCESSING, 2007, : 121 - 126
  • [44] Secure Transaction Authentication Protocol
    Pourghomi, Pardis
    Saeed, Muhammad Qasim
    Abi-Char, Pierre E.
    INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS, (SECITC 2016), 2016, 10006 : 261 - 273
  • [45] Secure Computation Without Authentication
    Barak, Boaz
    Canetti, Ran
    Lindell, Yehuda
    Pass, Rafael
    Rabin, Tal
    JOURNAL OF CRYPTOLOGY, 2011, 24 (04) : 720 - 760
  • [46] Authentication and Secure Robot Communication
    Yfantis, Evangelos A.
    Fayed, Ahmad
    INTERNATIONAL JOURNAL OF ADVANCED ROBOTIC SYSTEMS, 2014, 11
  • [47] Secure Authentication in the Smart Grid
    Hosseinzadeh, Mehdi
    Ali Naqvi, Rizwan
    Safkhani, Masoumeh
    Tightiz, Lilia
    Majid Mehmood, Raja
    MATHEMATICS, 2023, 11 (01)
  • [48] Multiround Unconditionally Secure Authentication
    Gehrmann C.
    Designs, Codes and Cryptography, 1998, 15 (1) : 67 - 86
  • [49] Secure Authentication Protocol for Mobile
    Kalaichelvi, V.
    Chandrasekaran, R. M.
    ICCN: 2008 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING, 2008, : 38 - +
  • [50] On the Design of Secure Multimedia Authentication
    Wang, Jinwei
    Lue, Jianmin
    Lian, Shiguo
    Liu, Guangjie
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2009, 15 (02) : 426 - 443