Skip to search formSkip to main contentSkip to account menu

Authentication

Known as: Authenticated copy, AuthN, Auth 
Authentication (from Greek: αὐθεντικός authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
In this paper presents the development of unified methods and software tools for processing information resources in electronic… 
Highly Cited
2011
Highly Cited
2011
In the recent era, cloud computing has evolved as a net centric, service oriented computing model. Consumers purchase computing… 
Highly Cited
2007
Highly Cited
2005
Highly Cited
2005
Ad-hoc networks constitute a peculiar computing environment, characterized by the lack of centralized support from pre-existing… 
Highly Cited
2004
Highly Cited
2004
Steganography has been proposed as a methodology for transmitting messages through innocuous covers to conceal their existence… 
Highly Cited
2004
Highly Cited
2004
Wireless sensor networks increasingly become viable solutions to many challenging problems and will successively be deployed in… 
Highly Cited
2002
Highly Cited
2002
Running a large-scale distributed simulation may need a large amount of computing resources at geographically different locations… 
Highly Cited
1989
Highly Cited
1989
Highly Cited
1980
Highly Cited
1980
It was demonstrated that the male rainbow trout, Salmo gairdneri, were able to discriminate post-ovulatory females from pre…