Skip to search formSkip to main contentSkip to account menu

Authentication

Known as: Authenticated copy, AuthN, Auth 
Authentication (from Greek: αὐθεντικός authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
Highly Cited
2011
In the recent era, cloud computing has evolved as a net centric, service oriented computing model. Consumers purchase computing… 
Highly Cited
2007
Highly Cited
2005
Highly Cited
2005
Ad-hoc networks constitute a peculiar computing environment, characterized by the lack of centralized support from pre-existing… 
Highly Cited
2004
Highly Cited
2004
As the proliferation of Internet, mobile agent related technologies are examined for possible growth and evaluation. In… 
Highly Cited
2004
Highly Cited
2004
Steganography has been proposed as a methodology for transmitting messages through innocuous covers to conceal their existence… 
Highly Cited
2002
Highly Cited
2002
Running a large-scale distributed simulation may need a large amount of computing resources at geographically different locations…