Design of User Authentication and DRM Security System Using Security Agent
نویسندگان
چکیده
منابع مشابه
Security System Based on User Authentication Using Keystroke Dynamics
−Keystroke Dynamics is behavioural biometric used to measure the typing rhythm of the user when an individual types on the keyboard. It is assumed as a robust behavioural biometric. The functionality of this biometric is to measure the dwell time and flight time for changing keyboard actions. The paper focuses on enhancement of security using individual’s typing actions to distinguish between a...
متن کاملKnowledge Based Security Using Drm
To take precautionary secures to the software is combat work. The analysis of avoiding the unauthorized access to the software will be done by the knowledge based security using Digital Rights Management. DRM is a standard code. The DRM will embed with source code which will protect from piracy. Knowledge based DRM and biometric based DRM are the two methods using in security process. In the pr...
متن کاملSecurity Design Scheme for User Authentication on Wireless Sensor Networks
In this paper, we consider User Authentication (UA) for wireless sensor networks. UA is a fundamental issue in designing dependable and secure systems. Imagine that a wireless sensor network is deployed in an intelligent building, a hospital, or even a university campus, to allow legitimate users to send queries and retrieve the respective result at any of the sensor nodes. Importantly, the sys...
متن کاملIncreasing security in DRM systems through biometric authentication
IEEE SIGNAL PROCESSING MAGAZINE 50 MARCH 2004 ecuring the exchange of intellectual property and providing protection to multimedia contents in distribution systems have enabled the advent of digital rights management (DRM) systems [5], [14], [21], [47], [51], [53]. Rights holders should be able to license, monitor, and track the usage of rights in a dynamic digital trading environment, especial...
متن کاملSecurity Vulnerabilities of User Authentication Scheme Using Smart Card
With the exponential growth of Internet users, various business transactions take place over an insecure channel. To secure these transactions, authentication is the primary step that needs to be passed. To overcome the problems associated with traditional password based authentication methods, smart card authentication schemes have been widely used. However, most of these schemes are vulnerabl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The KIPS Transactions:PartC
سال: 2005
ISSN: 1598-2858
DOI: 10.3745/kipstc.2005.12c.7.973