IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Property Protection and User Authentication in IP Networks through Challenge-Response Mechanisms: Present, Past and Future Trends

Property Protection and User Authentication in IP Networks through Challenge-Response Mechanisms: Present, Past and Future Trends
View Sample PDF
Author(s): Giaime Ginesu (University of Cagliari, Italy), Mirko Luca Lobina (University of Cagliari, Italy)and Daniele D. Giusto (University of Cagliari, Italy)
Copyright: 2012
Pages: 31
Source title: Information Technology for Intellectual Property Protection: Interdisciplinary Advancements
Source Author(s)/Editor(s): Hideyasu Sasaki (Ritsumeikan University, Japan)
DOI: 10.4018/978-1-61350-135-1.ch005

Purchase


Abstract

Authentication is the way of identifying an individual. The techniques used to accomplish such practice strongly depend on the involved parties, their interconnection, and the required level of security. In all cases, authentication is used to enforce property protection, and may be specifically intended for the copyright protection of digital contents published on the Internet. This work introduces the basic concepts of authentication explaining their relationship with property protection. The basic functionalities of Challenge-Response frameworks are presented, together with several applications and the future trends.

Related Content

Jeff Mangers, Christof Oberhausen, Meysam Minoufekr, Peter Plapper. © 2020. 26 pages.
Sylvain Maechler, Jean-Christophe Graz. © 2020. 27 pages.
Sabrina Petersohn, Sophie Biesenbender, Christoph Thiedig. © 2020. 41 pages.
Jonas Lundsten, Jesper Mayntz Paasch. © 2020. 21 pages.
Justus Alexander Baron. © 2020. 31 pages.
Vasileios Mavroeidis, Petros E. Maravelakis, Katarzyna Tarnawska. © 2020. 19 pages.
Hiam Serhan, Doudja Saïdi-Kabeche. © 2020. 30 pages.
Body Bottom