Skip to search formSkip to main contentSkip to account menu

Authentication

Known as: Authenticated copy, AuthN, Auth 
Authentication (from Greek: αὐθεντικός authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Mobile users are often faced with a trade-off between security and convenience. Either users do not use any security lock and… 
Highly Cited
2008
Highly Cited
2008
The popularity of "Trust-on-first-use" (Tofu) authentication, used by SSH and HTTPS with self-signed certificates, demonstrates… 
Highly Cited
2008
Highly Cited
2008
Physical Unclonable Functions (PUFs) have properties that make them very attractive for a variety of security-related… 
Highly Cited
2007
Highly Cited
2007
Securing interactions between devices that do not know each other a priori is an important and challenging task. We present Amigo… 
Highly Cited
2007
Highly Cited
2007
This paper describes gait recognition using a body worn sensor. An accelerometer sensor (placed in the trousers pocket) is used… 
Highly Cited
2006
Highly Cited
2006
In this paper, we propose a new reversible image authentication technique based on watermarking where if the image is authentic… 
Highly Cited
2006
Highly Cited
2006
In a paper recently published in the IEEE Transactions on Consumer Electronics, Zhu and Ma proposed a new authentication scheme… 
Highly Cited
2003
Highly Cited
2003
How can we authenticate broadcast messages? This chapter begins to answer our central question. We introduce TESLA, short for… 
Highly Cited
2002
Highly Cited
2002
We introduce the concept of hierarchical identity-based encryption (HIBE) schemes, give precise definitions of their security and… 
Highly Cited
2000
Highly Cited
2000
We propose a new remote user authentication scheme using smart cards. The scheme is based on the ElGamal's (1985) public key…