Property Protection and User Authentication in IP Networks Through Challenge-Response Mechanisms

Author(s):  
Giaime Ginesu ◽  
Mirko Luca Lobina ◽  
Daniele D. Giusto

Authentication is the way of identifying an individual. The techniques used to accomplish such practice strongly depend on the involved parties, their interconnection, and the required level of security. In all cases, authentication is used to enforce property protection, and may be specifically intended for the copyright protection of digital contents published on the Internet. This chapter introduces the basic concepts of authentication, explaining their relationship with property protection. The basic functionalities of challenge-response frameworks are presented, together with several applications and the future trends.

Author(s):  
Giaime Ginesu ◽  
Mirko Luca Lobina ◽  
Daniele D. Giusto

Authentication is the way of identifying an individual. The techniques used to accomplish such practice strongly depend on the involved parties, their interconnection, and the required level of security. In all cases, authentication is used to enforce property protection, and may be specifically intended for the copyright protection of digital contents published on the Internet. This work introduces the basic concepts of authentication explaining their relationship with property protection. The basic functionalities of Challenge-Response frameworks are presented, together with several applications and the future trends.


Author(s):  
Shanthi Sivakumar

The number of users using the internet has drastically increased. Due to the large number of online users, demand has increased in various fields like social networks, knowledge sharing, commerce, etc. to protect the user's private data as well as control access. Unfortunately, the need for security and authentication for individual data also increased. In an attempt to confront the new risks unveiled by the networking revolution over the recent years, we need an efficient means for automatically recognizing the identity of individuals. Biometric authentication provides an improved level of security and paves the way to the future. Further, biometric authentication systems are classified as physiological biometric and behavioral biometric technologies. Further, the author provides ideas on research challenges and the future of authentication systems.


Author(s):  
Meghna Babubhai Patel ◽  
Jagruti N. Patel ◽  
Upasana M. Bhilota

ANN can work the way the human brain works and can learn the way we learn. The neural network is this kind of technology that is not an algorithm; it is a network that has weights on it, and you can adjust the weights so that it learns. You teach it through trials. It is a fact that the neural network can operate and improve its performance after “teaching” it, but it needs to undergo some process of learning to acquire information and be familiar with them. Nowadays, the age of smart devices dominates the technological world, and no one can deny their great value and contributions to mankind. A dramatic rise in the platforms, tools, and applications based on machine learning and artificial intelligence has been seen. These technologies not only impacted software and the internet industry but also other verticals such as healthcare, legal, manufacturing, automobile, and agriculture. The chapter shows the importance of latest technology used in ANN and future trends in ANN.


Author(s):  
Justine Pila ◽  
Paul L.C. Torremans

This chapter offers an outlook to the future of IP at the European level. The EU and its legal instruments primarily approach IP from a utilitarian free market perspective and that applies also to the way they look at the future. The chapter focuses primarily on that angle when it looks at how the European IP system could and should function in the future and which direction it is taking. In a sense it offers an opportunity for reflection and attempts to enhance the reader's insight in and understanding of IP by wrapping the critical analysis of its technical rules up in a more theoretical analysis.


2009 ◽  
Vol 2 (3) ◽  
Author(s):  
Marc Van den Broeck ◽  
Sigurd Van Broeck ◽  
David Zhe Lou

One of the technologies from which we can say that it definitely and completely changed the way we work today is the Internet. Along with these many advantages, people are however also burdened with inefficient parental control, spam , pop-ups, viruses, adware and spyware to name a few. Virtual Environments (VE) are posing themselves as the future of Internet. Today, several 100s of VEs already exist, each addressing a certain target group. These VEs will have to deal with the same negative influence as the Internet of today only now presenting itself in a different package. This paper proposes a solution to guard our future Internet already from the very start from such counterproductive content.


Author(s):  
Ahmed Ben Ayed ◽  
Mohamed Amine Belhajji

This article describes how Blockchain is a technology that has a great potential to change the way business is done in the future, exactly like the internet did in the early nineties. Blockchain offers new opportunities to develop new types of digital services to overcome business problems, and improve business practices by making transaction information a public resource. While research on the topic is still emerging, it has mostly focused on crypto-currencies instead of taking advantage of this novel concept to create new advanced services. This article discusses blockchain and the technology behind it, some of its possible applications, as well as threats targeting the new poorly understood technology.


2011 ◽  
pp. 213-231 ◽  
Author(s):  
Luisa M. Regueras ◽  
Elena Verdú ◽  
María A. Pérez ◽  
Juan Pablo de Castro ◽  
María J. Verdú

Nowadays, most of electronic applications, including e-learning, are based on the Internet and the Web. As the Web advances, applications should progress in accordance with it. People in the Internet world have started to talk about Web 2.0. This chapter discusses how the concepts of Web 2.0 can be transferred to e-learning. First, the new trends of the Web (Web 2.0) are introduced and the Web 2.0 technologies are reviewed. Then, it is analysed how Web 2.0 can be transferred and applied to the learning process, in terms of methodologies and tools, and taking into account different scenarios and roles. Next, some good practices and recommendations for E-Learning 2.0 are described. Finally, we present our opinion, conclusions, and proposals about the future trends driving the market.


2020 ◽  
pp. 1770-1781
Author(s):  
Ahmed Ben Ayed ◽  
Mohamed Amine Belhajji

This article describes how Blockchain is a technology that has a great potential to change the way business is done in the future, exactly like the internet did in the early nineties. Blockchain offers new opportunities to develop new types of digital services to overcome business problems, and improve business practices by making transaction information a public resource. While research on the topic is still emerging, it has mostly focused on crypto-currencies instead of taking advantage of this novel concept to create new advanced services. This article discusses blockchain and the technology behind it, some of its possible applications, as well as threats targeting the new poorly understood technology.


First Monday ◽  
1997 ◽  
Author(s):  
Bjorn Hermans

Software agents are a rapidly developing area of research. However, to many it is unclear what agents are and what they can (and maybe cannot) do. In the first part, this thesis will provide an overview of these, and many other agent-related theoretical and practical aspects. Besides that, a model is presented which will enhance and extend agents' abilities, but will also improve the way the Internet can be used to obtain or offer information and services on it. The second part is all about trends and developments. On the basis of past and present developments of the most important, relevant and involved parties and factors, future trends and developments are extrapolated and predicted.


Author(s):  
V. Walter ◽  
D. Laupheimer ◽  
D. Fritsch

Crowdsourcing is a new technology and a new business model that will change the way in which we work in many fields in the future. Employers divide and source out their work to a huge number of anonymous workers on the Internet. The division and outsourcing is not a trivial process but requires the definition of complete new workflows – from the definition of subtasks, to the execution and quality control. A popular crowdsourcing project in the field of collection of geodata is OpenStreetMap, which is based on the work of unpaid volunteers. Crowdsourcing projects that are based on the work of unpaid volunteers need an active community, whose members are convinced about the importance of the project and who have fun to collaborate. This can only be realized for some tasks. In the field of geodata collection many other tasks exist, which can in principle be solved with crowdsourcing, but where it is difficult to find a sufficient large number of volunteers. Other incentives must be provided in these cases, which can be monetary payments.


Sign in / Sign up

Export Citation Format

Share Document