Skip to search formSkip to main contentSkip to account menu

Authentication

Known as: Authenticated copy, AuthN, Auth 
Authentication (from Greek: αὐθεντικός authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2015
Review
2015
Wireless sensor networks are increasingly gaining attention. In recent years, a great deal of monitoring, control and tracking… 
2011
2011
Smartphones, which contain a large number of sensors and integrated devices, are becoming increasingly powerful and fully… 
2009
2009
This paper presents a fuel cell (FC) current ripple mitigation by interleaved algorithm for high power dc distributed system… 
2009
2009
We demonstrate ACCNT (pronounced as ldquoaccentrdquo), a solution to the metallic-nanotube problem that does not require any… 
2003
2003
The peer-to-peer approach to design large-scale systems has significant benefits including scalability, low cost of ownership… 
2002
2002
With the advent of IP technologies and the tremendous growth in data traffic, the wireless industry is evolving its core networks… 
2000
2000
  • J. MillenH. Ruess
  • 2000
  • Corpus ID: 2048891
Inductive proofs of secrecy invariants for cryptographic protocols can be facilitated by separating the protocol dependent part… 
1998
1998
The Virtual Learning Environment (VLE) is an integrated university environment where students can apply for admission over the… 
Highly Cited
1980
Highly Cited
1980
It was demonstrated that the male rainbow trout, Salmo gairdneri, were able to discriminate post-ovulatory females from pre… 
1974
1974
This study was conducted to determine the effect of N fertilizer and irrigation management on potato (Solanum tuberosum L…