Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 219,937,497 papers from all fields of science
Search
Sign In
Create Free Account
Authentication
Known as:
Authenticated copy
, AuthN
, Auth
Expand
Authentication (from Greek: αὐθεντικός authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Application security
Backhaul (telecommunications)
Block cipher mode of operation
Certificate policy
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Fuzzy extractors : How to generate strong keys from biometrics and other noisy data
Suela Kodra
2015
Corpus ID: 6676391
Review
2014
Review
2014
Clustering in sensor networks: A literature survey
M. M. Afsar
,
Mohammad-H. Tayarani-N.
Journal of Network and Computer Applications
2014
Corpus ID: 14119929
Review
2014
Review
2014
A recent survey of reversible watermarking techniques
Asifullah Khan
,
A. Siddiqa
,
Summuyya Munib
,
S. Malik
Information Sciences
2014
Corpus ID: 109171
Highly Cited
2011
Highly Cited
2011
Ensemble of local and global information for finger-knuckle-print recognition
Lin Zhang
,
Lei Zhang
,
David Zhang
,
Hailong Zhu
Pattern Recognition
2011
Corpus ID: 13054982
Highly Cited
2009
Highly Cited
2009
Fast copy-move forgery detection
Hwei-Jen Lin
,
Chun-Wei Wang
,
Yang-Ta Kao
2009
Corpus ID: 16322425
This paper proposes a method for detecting copy-move forgery over images tampered by copy-move. To detect such forgeries, the…
Expand
Highly Cited
2008
Highly Cited
2008
Control Algorithm of Fuel Cell and Batteries for Distributed Generation System
P. Thounthong
,
S. Rael
,
B. Davat
IEEE transactions on energy conversion
2008
Corpus ID: 6561688
This paper intends to propose a novel control algorithm for utilizing a polymer electrolyte membrane fuel cell (PEMFC) as a main…
Expand
Highly Cited
2004
Highly Cited
2004
How to Disembed a Program?
Benoît Chevallier-Mames
,
D. Naccache
,
Pascal Paillier
,
D. Pointcheval
IACR Cryptology ePrint Archive
2004
Corpus ID: 8844855
This paper presents the theoretical blueprint of a new secure token called the Externalized Microprocessor (X μ P). Unlike a…
Expand
Highly Cited
2001
Highly Cited
2001
Objective Verification of the SAMEX ’98 Ensemble Forecasts
D. Hou
,
E. Kalnay
,
K. Droegemeier
2001
Corpus ID: 14533574
During May 1998, the Center for Analysis and Prediction of Storms (CAPS) at the University of Oklahoma coordinated a multi…
Expand
Highly Cited
1998
Highly Cited
1998
A network architecture for heterogeneous mobile computing
E. Brewer
,
R. Katz
,
+10 authors
S. Seshan
IEEE wireless communications
1998
Corpus ID: 5180037
This article summarizes the results of the BARWAN project, which focused on enabling truly useful mobile networking across an…
Expand
Highly Cited
1975
Highly Cited
1975
Some cryptographic techniques for machine-to-machine data communications
Horst Feistel
,
W. Notz
,
J. L. Smith
Proceedings of the IEEE
1975
Corpus ID: 2958540
Some of the threats to the integrity of multiuser teleprocessing systems and to the data they contain can be countered by the use…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE