Authentication, Identification Techniques, and Secure Containers – Baseline Technologies

  • Spenger G
N/ACitations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The commercial distribution of multimedia content over the Internet de- mands high security mechanisms. There is not only the possibility of third persons intercepting the communication, but also the risk of malevolent hackers faking the identity of registered users. This paper describes mechanisms that prevent such at- tacks. First an overview of cryptographic algorithms is given. After that the terms identification and authentication are defined and examples of techniques and protocols for user and content authentication are given. The next sections give a short overview of connection based security protocols and the secure container technology used in DRM systems. The final section shows some security aspects of client DRM systems. I Introduction

Cite

CITATION STYLE

APA

Spenger, G. (2003). Authentication, Identification Techniques, and Secure Containers – Baseline Technologies (pp. 62–80). https://doi.org/10.1007/10941270_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free