Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Authentication

Known as: Authenticated copy, AuthN, Auth 
Authentication (from Greek: αὐθεντικός authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2020
Review
2020
The Internet of Things (IoT) integrates billions of smart devices that can communicate with one another with minimal human… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Review
2019
Review
2019
The Internet of Things (IoT) is the next era of communication. Using the IoT, physical objects can be empowered to create… Expand
  • table 1
  • table 2
  • table 3
  • figure 2
  • figure 3
Is this relevant?
Review
2019
Review
2019
Abstract The intelligent transportation system (ITS) is made possible and practical due to vehicular ad hoc networks (VANETs… Expand
Is this relevant?
Review
2019
Review
2019
Abstract Blockchain has a range of built-in features, such as distributed ledger, decentralized storage, authentication, security… Expand
Is this relevant?
Review
2019
Review
2019
This paper researches decentralized data storage represented by blockchain technology and the possibility of its development in… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Review
2019
Review
2019
In the last century, the automotive industry has arguably transformed society, being one of the most complex, sophisticated, and… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 2
Is this relevant?
Review
2019
Review
2019
The engineering vision of relying on the “smart sky” for supporting air traffic and the “internet-above-the-clouds” for in-flight… Expand
  • figure 1
  • figure 2
  • table I
  • table II
  • figure 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
This document describes an updated version of the IP Authentication Header (AH), which is designed to provide authentication… Expand
Is this relevant?
Highly Cited
1997
Highly Cited
1997
  • G. Lowe
  • Proceedings 10th Computer Security Foundations…
  • 1997
  • Corpus ID: 16952640
Many security protocols have the aim of authenticating one agent to another. Yet there is no clear consensus in the academic… Expand
Is this relevant?
Highly Cited
1981
Highly Cited
1981
A method of user password authentication is described which is secure even if an intruder can read the system's data, and can… Expand
Is this relevant?