Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,184,865 papers from all fields of science
Search
Sign In
Create Free Account
Authentication server
Known as:
AS
, Authentication store
, Security store
An authentication server provides a network service that applications use to authenticate the credentials, usually account names and passwords, of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
Algorithm
Authentication
Authorization
GNU Hurd
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
An online security protocol for NFC payment: Formally analyzed by the scyther tool
Nour El Madhoun
,
F. Guenane
,
G. Pujolle
Second International Conference on Mobile and…
2016
Corpus ID: 12214798
Nowadays, NFC technology is integrated into bank cards, smartphones and sales point terminals in order to immediately execute…
Expand
2014
2014
i/k-Contact: A context-aware user authentication using physical social trust
Shiori Arimura
,
Masahiro Fujita
,
Shinya Kobayashi
,
Junya Kani
,
M. Nishigaki
,
Akira Shiba
Twelfth Annual International Conference on…
2014
Corpus ID: 10512822
In recent years, with growing demands towards big data application, various research on context-awareness has once again become…
Expand
2013
2013
HOTA: Handover optimized ticket-based authentication in network-based mobility management
Jong‐Hyouk Lee
,
J. Bonnin
Information Sciences
2013
Corpus ID: 13401178
2009
2009
Federated Authentication Mechanism using Cellular Phone - Collaboration with OpenID
R. Watanabe
,
Toshiaki Tanaka
Sixth International Conference on Information…
2009
Corpus ID: 17745268
OpenID authentication is a method to provide a single sign-on (SSO) service among Internet service sites. OpenID has been widely…
Expand
2009
2009
Privacy Preserving DRM Solution with Content Classification and Superdistribution
Jun Yao
,
Sunnam Lee
,
Suhyun Nam
6th IEEE Consumer Communications and Networking…
2009
Corpus ID: 16890459
Digital Rights Management (DRM) is indispensable to prevent various kinds of illegal content usage. However, personal privacy is…
Expand
2007
2007
Web voting, security and cryptography
A. Pasquinucci
2007
Corpus ID: 58518149
Highly Cited
2005
Highly Cited
2005
Efficient verifier-based key agreement protocol for three parties without server's public key
Sung-Woon Lee
,
Hyun-Sung Kim
,
K. Yoo
Applied Mathematics and Computation
2005
Corpus ID: 42426863
2005
2005
A new proxy signature scheme with revocation
Eric Jui-Lin Lu
,
M. Hwang
,
Cheng-Jian Huang
Applied Mathematics and Computation
2005
Corpus ID: 17616981
1996
1996
A Security Framework Supporting Domain Based Access Control in Distributed Systems
Nicholas Yialelis
,
M. Sloman
Network and Distributed System Security Symposium
1996
Corpus ID: 10619533
This paper describes a security framework for object-based distributed systems which is being developed in the CORBA-compliant…
Expand
1993
1993
Authentication services in distributed systems
D. Gollmann
,
T. Beth
,
Frank Damm
Computers & security
1993
Corpus ID: 27316004
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE