Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 229,505,270 papers from all fields of science
Search
Sign In
Create Free Account
Authentication
Known as:
Authenticated copy
, AuthN
, Auth
Expand
Authentication (from Greek: αὐθεντικός authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Application security
Backhaul (telecommunications)
Block cipher mode of operation
Certificate policy
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
Cloud computing security auditing
I.A. Gul
,
Atiq ur Rehman
,
M. H. Islam
The 2nd International Conference on Next…
2011
Corpus ID: 9137065
In the recent era, cloud computing has evolved as a net centric, service oriented computing model. Consumers purchase computing…
Expand
Highly Cited
2010
Highly Cited
2010
Reversible fragile watermarking for locating tampered blocks in JPEG images
Xinpeng Zhang
,
Shuozhong Wang
,
Zhenxing Qian
,
Guorui Feng
Signal Processing
2010
Corpus ID: 15568009
Highly Cited
2007
Highly Cited
2007
A majority-voting based watermarking scheme for color image tamper detection and recovery
Ming-Shi Wang
,
Wei-Che Chen
Comput. Stand. Interfaces
2007
Corpus ID: 11120466
2006
2006
Certifying algorithms for recognizing proper circular-arc graphs and unit circular-arc graphs
Haim Kaplan
,
Yahav Nussbaum
Discrete Applied Mathematics
2006
Corpus ID: 1012455
Highly Cited
2005
Highly Cited
2005
Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach
Simone Leggio
,
J. Manner
,
A. Hulkkonen
,
K. Raatikainen
2005
Corpus ID: 18288758
Ad-hoc networks constitute a peculiar computing environment, characterized by the lack of centralized support from pre-existing…
Expand
Highly Cited
2004
Highly Cited
2004
A steganographic scheme for secure communications based on the chaos and euler Theorem
D. Lou
,
Chia-Hung Sung
IEEE transactions on multimedia
2004
Corpus ID: 12770859
Steganography has been proposed as a methodology for transmitting messages through innocuous covers to conceal their existence…
Expand
2003
2003
Toward explicit policy management for virtual organizations
G. Wasson
,
M. Humphrey
Proceedings POLICY . IEEE 4th International…
2003
Corpus ID: 253560
A virtual organization (VO) is a dynamic collection of distributed resources that are shared by a dynamic collection of users…
Expand
Highly Cited
2002
Highly Cited
2002
A load management system for running HLA-based distributed simulations over the grid
Wentong Cai
,
S. Turner
,
Hanfeng Zhao
Proceedings. Sixth IEEE International Workshop on…
2002
Corpus ID: 27234285
Running a large-scale distributed simulation may need a large amount of computing resources at geographically different locations…
Expand
2002
2002
Comparing Symbolic and Explicit Model Checking of a Software System
C. Eisner
,
D. Peled
SPIN
2002
Corpus ID: 18591905
There are two main paradigms for model checking: symbolic model checking, as is performed by the tool RuleBase, and explicit…
Expand
Highly Cited
1998
Highly Cited
1998
Threshold signature schemes with traceable signers in group communications
Ching-Te Wang
,
Chu-Hsing Lin
,
Chinchen Chang
Computer Communications
1998
Corpus ID: 33317736
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE