Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,096,155 papers from all fields of science
Search
Sign In
Create Free Account
Authentication
Known as:
Authenticated copy
, AuthN
, Auth
Expand
Authentication (from Greek: αὐθεντικός authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Application security
Backhaul (telecommunications)
Block cipher mode of operation
Certificate policy
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2004
Highly Cited
2004
A dynamic ID-based remote user authentication scheme
M. Das
,
A. Saxena
,
V. Gulati
IEEE transactions on consumer electronics
2004
Corpus ID: 8235272
Password-based authentication schemes are the most widely used techniques for remote user authentication. Many static ID-based…
Expand
Highly Cited
2003
Highly Cited
2003
Comparing passwords, tokens, and biometrics for user authentication
L. O'Gorman
Proceedings of the IEEE
2003
Corpus ID: 11397126
For decades, the password has been the standard means for user authentication on computers. However, as users are required to…
Expand
Highly Cited
2003
Highly Cited
2003
Secure smartcardbased fingerprint authentication
T. C. Clancy
,
N. Kiyavash
,
D. Lin
Workshop Brasileira em Métodos Agile / Brazilian…
2003
Corpus ID: 8429422
In this paper, the fundamental insecurities hampering a scalable, wide-spread deployment of biometric authentication are examined…
Expand
Highly Cited
2001
Highly Cited
2001
Invertible authentication
J. Fridrich
,
M. Goljan
,
Rui Du
Security and Watermarking of Multimedia Contents
2001
Corpus ID: 20925504
In this paper, we present two new methods for authentication of digital images using invertible watermarking. While virtually all…
Expand
Highly Cited
2000
Highly Cited
2000
Efficient authentication and signing of multicast streams over lossy channels
A. Perrig
,
R. Canetti
,
Z. J. D. Tygar
,
D. Song
,
Uc Berkeley
,
I. T. Watson
Proceeding IEEE Symposium on Security and…
2000
Corpus ID: 1811563
Multicast stream authentication and signing is an important and challenging problem. Applications include the continuous…
Expand
Highly Cited
2000
Highly Cited
2000
A new remote user authentication scheme using smart cards
M. Hwang
,
Li-Hua Li
IEEE Trans. Consumer Electron.
2000
Corpus ID: 19941021
We propose a new remote user authentication scheme using smart cards. The scheme is based on the ElGamal's (1985) public key…
Expand
Highly Cited
1997
Highly Cited
1997
Remote Authentication Dial In User Service (RADIUS)
C. Rigney
,
A. Rubens
,
W. Simpson
,
Steve Willens
Request for Comments
1997
Corpus ID: 24289709
This document describes a protocol for carrying authentication, authorization, and configuration information between a Network…
Expand
Highly Cited
1997
Highly Cited
1997
Authentication via keystroke dynamics
F. Monrose
,
A. Rubin
Conference on Computer and Communications…
1997
Corpus ID: 1015076
In an effort to confront the challenges brought forward by the networking revolution of the past few years, we present improved…
Expand
Highly Cited
1990
Highly Cited
1990
Identity authentication based on keystroke latencies
R. Joyce
,
G. Gupta
Communications of the ACM
1990
Corpus ID: 12175721
The variables that help make a handwritten signature a unique human identifier also provide a unique digital signature in the…
Expand
Highly Cited
1979
Highly Cited
1979
Secrecy, authentication, and public key systems
R. Merkle
1979
Corpus ID: 60720543
An automatic control system for a tube expander tool of the type having a hydraulically powered rotary tool which is advanced and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE