The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Property Protection and User Authentication in IP Networks Through Challenge-Response Mechanisms: Present, Past, and Future Trends
Abstract
Authentication is the way of identifying an individual. The techniques used to accomplish such practice strongly depend on the involved parties, their interconnection, and the required level of security. In all cases, authentication is used to enforce property protection, and may be specifically intended for the copyright protection of digital contents published on the Internet. This chapter introduces the basic concepts of authentication, explaining their relationship with property protection. The basic functionalities of challenge-response frameworks are presented, together with several applications and the future trends.
Related Content
Robin Throne, Michalina Hendon.
© 2024.
19 pages.
|
Fatmanur Özen, Aytekin Demircioğlu.
© 2024.
22 pages.
|
Kübra Kırca Demirbaga.
© 2024.
17 pages.
|
Gulcin Karadeniz.
© 2024.
15 pages.
|
Glenn Dawes.
© 2024.
20 pages.
|
Aylin Akinlar.
© 2024.
29 pages.
|
Ziaul Islam Jewel.
© 2024.
15 pages.
|
|
|