Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,908,453 papers from all fields of science
Search
Sign In
Create Free Account
Authentication
Known as:
Authenticated copy
, AuthN
, Auth
Expand
Authentication (from Greek: αὐθεντικός authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Application security
Backhaul (telecommunications)
Block cipher mode of operation
Certificate policy
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2015
Review
2015
A Survey of Image Security in Wireless Sensor Networks
Danilo de Oliveira Gonçalves
,
D. G. Costa
Journal of Imaging
2015
Corpus ID: 7188493
Wireless sensor networks are increasingly gaining attention. In recent years, a great deal of monitoring, control and tracking…
Expand
2011
2011
Weaving a Distributed, Semantic Social Network for Mobile Users
Sebastian Tramp
,
Philipp Frischmuth
,
Natanael Arndt
,
Timofey Ermilov
,
S. Auer
Extended Semantic Web Conference
2011
Corpus ID: 14653274
Smartphones, which contain a large number of sensors and integrated devices, are becoming increasingly powerful and fully…
Expand
2009
2009
Fuel Cell Current Ripple Mitigation by Interleaved Technique for High Power Applications
P. Thounthong
,
P. Sethakul
,
S. Raël
,
B. Davat
Annual Meeting of the IEEE Industry Applications…
2009
Corpus ID: 15171329
This paper presents a fuel cell (FC) current ripple mitigation by interleaved algorithm for high power dc distributed system…
Expand
2009
2009
ACCNT—A Metallic-CNT-Tolerant Design Methodology for Carbon-Nanotube VLSI: Concepts and Experimental Demonstration
A. Lin
,
N. Patil
,
Hai Wei
,
S. Mitra
,
H. Wong
IEEE Transactions on Electron Devices
2009
Corpus ID: 22553071
We demonstrate ACCNT (pronounced as ldquoaccentrdquo), a solution to the metallic-nanotube problem that does not require any…
Expand
2003
2003
Trust modeling for peer-to-peer based computing systems
Farag Azzedin
,
Muthucumaru Maheswaran
Proceedings International Parallel and…
2003
Corpus ID: 29557781
The peer-to-peer approach to design large-scale systems has significant benefits including scalability, low cost of ownership…
Expand
2002
2002
Wireless Internet access for mobile subscribers based on the GPRS/UMTS network
Jeong-Hyun Park
IEEE Communications Magazine
2002
Corpus ID: 62651382
With the advent of IP technologies and the tremendous growth in data traffic, the wireless industry is evolving its core networks…
Expand
2000
2000
Protocol-independent secrecy
J. Millen
,
H. Ruess
Proceeding IEEE Symposium on Security and…
2000
Corpus ID: 2048891
Inductive proofs of secrecy invariants for cryptographic protocols can be facilitated by separating the protocol dependent part…
Expand
1998
1998
The Virtual Learning Environment system
Anup Kumar
,
Raj Pakala
,
R. Ragade
,
J. Wong
FIE '98. 28th Annual Frontiers in Education…
1998
Corpus ID: 11468292
The Virtual Learning Environment (VLE) is an integrated university environment where students can apply for admission over the…
Expand
Highly Cited
1980
Highly Cited
1980
Female sex pheromone of rainbow trout, Salmo gairdneri, involved in courtship behavior.
Haruo Honda
1980
Corpus ID: 86045053
It was demonstrated that the male rainbow trout, Salmo gairdneri, were able to discriminate post-ovulatory females from pre…
Expand
1974
1974
Effect of Fertilizer and Irrigation on Nitrate‐Nitrogen and Total Nitrogen in Potato Tubers1
J. Carter
,
S. Bosma
1974
Corpus ID: 24905360
This study was conducted to determine the effect of N fertilizer and irrigation management on potato (Solanum tuberosum L…
Expand