Design of User Authentication and DRM Security System Using Security Agent

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security System Based on User Authentication Using Keystroke Dynamics

−Keystroke Dynamics is behavioural biometric used to measure the typing rhythm of the user when an individual types on the keyboard. It is assumed as a robust behavioural biometric. The functionality of this biometric is to measure the dwell time and flight time for changing keyboard actions. The paper focuses on enhancement of security using individual’s typing actions to distinguish between a...

متن کامل

Knowledge Based Security Using Drm

To take precautionary secures to the software is combat work. The analysis of avoiding the unauthorized access to the software will be done by the knowledge based security using Digital Rights Management. DRM is a standard code. The DRM will embed with source code which will protect from piracy. Knowledge based DRM and biometric based DRM are the two methods using in security process. In the pr...

متن کامل

Security Design Scheme for User Authentication on Wireless Sensor Networks

In this paper, we consider User Authentication (UA) for wireless sensor networks. UA is a fundamental issue in designing dependable and secure systems. Imagine that a wireless sensor network is deployed in an intelligent building, a hospital, or even a university campus, to allow legitimate users to send queries and retrieve the respective result at any of the sensor nodes. Importantly, the sys...

متن کامل

Increasing security in DRM systems through biometric authentication

IEEE SIGNAL PROCESSING MAGAZINE 50 MARCH 2004 ecuring the exchange of intellectual property and providing protection to multimedia contents in distribution systems have enabled the advent of digital rights management (DRM) systems [5], [14], [21], [47], [51], [53]. Rights holders should be able to license, monitor, and track the usage of rights in a dynamic digital trading environment, especial...

متن کامل

Security Vulnerabilities of User Authentication Scheme Using Smart Card

With the exponential growth of Internet users, various business transactions take place over an insecure channel. To secure these transactions, authentication is the primary step that needs to be passed. To overcome the problems associated with traditional password based authentication methods, smart card authentication schemes have been widely used. However, most of these schemes are vulnerabl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The KIPS Transactions:PartC

سال: 2005

ISSN: 1598-2858

DOI: 10.3745/kipstc.2005.12c.7.973