Property Protection and User Authentication in IP Networks through Challenge-Response Mechanisms

Property Protection and User Authentication in IP Networks through Challenge-Response Mechanisms

Author: 
Lobina, Mirko Luca
Place: 
Hershey, PA
Publisher: 
IGI Global
Date published: 
2011
Record type: 
Responsibility: 
Ginesu, Giaime, jt. author
Giusto, Daniele D., jt. author
Editor: 
Sasaki, Hideyasu
Source: 
Information Technology for Intellectual Property Protection
Subject: 
Abstract: 

Authentication is the way of identifying an individual. The techniques used to accomplish such practice strongly depend on the involved parties, their interconnection, and the required level of security. In all cases, authentication is used to enforce property protection, and may be specifically intended for the copyright protection of digital contents published on the Internet. This work introduces the basic concepts of authentication explaining their relationship with property protection. The basic functionalities of Challenge-Response frameworks are presented, together with several applications and the future trends.

Series: 
Advances in IT Standards and Standardization Research

CITATION: Lobina, Mirko Luca. Property Protection and User Authentication in IP Networks through Challenge-Response Mechanisms edited by Sasaki, Hideyasu . Hershey, PA : IGI Global , 2011. Information Technology for Intellectual Property Protection - Available at: https://library.au.int/property-protection-and-user-authentication-ip-networks-through-challenge-response-mechanisms