Skip to search formSkip to main contentSkip to account menu

Authentication

Known as: Authenticated copy, AuthN, Auth 
Authentication (from Greek: αὐθεντικός authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2004
Highly Cited
2004
Password-based authentication schemes are the most widely used techniques for remote user authentication. Many static ID-based… 
Highly Cited
2003
Highly Cited
2003
For decades, the password has been the standard means for user authentication on computers. However, as users are required to… 
Highly Cited
2003
Highly Cited
2003
In this paper, the fundamental insecurities hampering a scalable, wide-spread deployment of biometric authentication are examined… 
Highly Cited
2001
Highly Cited
2001
In this paper, we present two new methods for authentication of digital images using invertible watermarking. While virtually all… 
Highly Cited
2000
Highly Cited
2000
Multicast stream authentication and signing is an important and challenging problem. Applications include the continuous… 
Highly Cited
2000
Highly Cited
2000
We propose a new remote user authentication scheme using smart cards. The scheme is based on the ElGamal's (1985) public key… 
Highly Cited
1997
Highly Cited
1997
This document describes a protocol for carrying authentication, authorization, and configuration information between a Network… 
Highly Cited
1997
Highly Cited
1997
In an effort to confront the challenges brought forward by the networking revolution of the past few years, we present improved… 
Highly Cited
1990
Highly Cited
1990
The variables that help make a handwritten signature a unique human identifier also provide a unique digital signature in the… 
Highly Cited
1979
Highly Cited
1979
An automatic control system for a tube expander tool of the type having a hydraulically powered rotary tool which is advanced and…