Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,757 papers from all fields of science
Search
Sign In
Create Free Account
Authentication
Known as:
Authenticated copy
, AuthN
, Auth
Expand
Authentication (from Greek: αὐθεντικός authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Application security
Backhaul (telecommunications)
Block cipher mode of operation
Certificate policy
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
SU(N) quantum Racah coefficients & non-torus links
Zodinmawia
,
P. Ramadevi
2011
Corpus ID: 119127496
Highly Cited
2011
Highly Cited
2011
Cloud computing security auditing
I.A. Gul
,
Atiq ur Rehman
,
M. H. Islam
The 2nd International Conference on Next…
2011
Corpus ID: 9137065
In the recent era, cloud computing has evolved as a net centric, service oriented computing model. Consumers purchase computing…
Expand
Highly Cited
2010
Highly Cited
2010
Reversible fragile watermarking for locating tampered blocks in JPEG images
Xinpeng Zhang
,
Shuozhong Wang
,
Zhenxing Qian
,
Guorui Feng
Signal Processing
2010
Corpus ID: 15568009
Highly Cited
2009
Highly Cited
2009
Reversibility improved lossless data hiding
Xinbo Gao
,
Lingling An
,
Xuelong Li
,
D. Tao
Signal Processing
2009
Corpus ID: 6107411
Highly Cited
2007
Highly Cited
2007
A majority-voting based watermarking scheme for color image tamper detection and recovery
Ming-Shi Wang
,
Wei-Che Chen
Comput. Stand. Interfaces
2007
Corpus ID: 11120466
Highly Cited
2005
Highly Cited
2005
Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach
Simone Leggio
,
J. Manner
,
A. Hulkkonen
,
K. Raatikainen
2005
Corpus ID: 18288758
Ad-hoc networks constitute a peculiar computing environment, characterized by the lack of centralized support from pre-existing…
Expand
Highly Cited
2004
Highly Cited
2004
Fragile image watermarking using a gradient image for improved localization and security
S. Suthaharan
Pattern Recognition Letters
2004
Corpus ID: 12035876
Highly Cited
2004
Highly Cited
2004
A mobile agent security management
Eung-Gu You
,
Keum-Suk Lee
18th International Conference on Advanced…
2004
Corpus ID: 16590820
As the proliferation of Internet, mobile agent related technologies are examined for possible growth and evaluation. In…
Expand
Highly Cited
2004
Highly Cited
2004
A steganographic scheme for secure communications based on the chaos and euler Theorem
D. Lou
,
Chia-Hung Sung
IEEE transactions on multimedia
2004
Corpus ID: 12770859
Steganography has been proposed as a methodology for transmitting messages through innocuous covers to conceal their existence…
Expand
Highly Cited
2002
Highly Cited
2002
A load management system for running HLA-based distributed simulations over the grid
Wentong Cai
,
S. Turner
,
Hanfeng Zhao
Proceedings. Sixth IEEE International Workshop on…
2002
Corpus ID: 27234285
Running a large-scale distributed simulation may need a large amount of computing resources at geographically different locations…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE