Authentication

Known as: Authenticated copy, AuthN, Auth 
Authentication (from Greek: αὐθεντικός authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2007
Highly Cited
2007
Physical Unclonable Functions (PUFs) are innovative circuit primitives that extract secrets from physical characteristics of… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Sensor networks are often deployed in unattended environments, thus leaving these networks vulnerable to false data injection… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
In this paper we address the problem of secure communication and authentication in ad-hoc wireless networks. This is a difficult… (More)
  • figure 1
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Because biometrics-based authentication offers several advantages over other authentication methods, there has been a significant… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We describe a watermarking scheme for ownership verification and authentication. Depending on the desire of the user, the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 6
  • figure 4
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Multicast stream authentication and signing is an important and challenging problem. Applications include the continuous… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2000
Highly Cited
2000
In this article, we propose a new remote user authentication scheme using smart cards. The scheme is based on the ElGamal’s… (More)
Is this relevant?
Highly Cited
1999
Highly Cited
1999
In this paper, we consider the problem of digital watermarking to ensure the credibility of multimedia. We specifically address… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1996
Highly Cited
1996
Many security protocols have the aim of authenticating one agent to another. Yet there is no clear consensus in the academic… (More)
Is this relevant?
Highly Cited
1994
Highly Cited
1994
When using authentication based on cryptography, an attacker listening to the network gains no information that would enable it… (More)
Is this relevant?