Skip to search formSkip to main contentSkip to account menu
You are currently offline. Some features of the site may not work correctly.

Authentication

Known as: Authenticated copy, AuthN, Auth 
Authentication (from Greek: αὐθεντικός authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2003
Review
2003
Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of… Expand
Highly Cited
2002
Highly Cited
2002
Unlike other access control systems based on biometric features, keystroke analysis has not led to techniques providing an… Expand
  • figure 1
  • figure 2
  • figure 3
  • table I
  • table II
Highly Cited
2001
Highly Cited
2001
One of the main challenges of securing multicast communicationis source authentication,or enabling receivers of multicast data to… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
1997
Highly Cited
1997
  • G. Lowe
  • Proceedings 10th Computer Security Foundations…
  • 1997
  • Corpus ID: 16952640
Many security protocols have the aim of authenticating one agent to another. Yet there is no clear consensus in the academic… Expand
Highly Cited
1997
Highly Cited
1997
Fingerprint verification is an important biometric technique for personal identification. We describe the design and… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Highly Cited
1994
Highly Cited
1994
When using authentication based on cryptography, an attacker listening to the network gains no information that would enable it… Expand
  • figure 2
Review
1993
Review
1993
This document gives an overview and specification of Version 5 of the protocol for the Kerberos network authentication system… Expand
Highly Cited
1991
Highly Cited
1991
We describe a theory of authentication and a system that implements it. Our theory is based on the notion of principal and a… Expand
  • figure 1
  • table 1
  • table 2
  • figure 2
  • table 3
Highly Cited
1981
Highly Cited
1981
A method of user password authentication is described which is secure even if an intruder can read the system's data, and can… Expand
Highly Cited
1978
Highly Cited
1978
Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for… Expand