Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,816,088 papers from all fields of science
Search
Sign In
Create Free Account
Authentication
Known as:
Authenticated copy
, AuthN
, Auth
Expand
Authentication (from Greek: αὐθεντικός authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Application security
Backhaul (telecommunications)
Block cipher mode of operation
Certificate policy
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Designing architecture of electronic content commerce system
V. Lytvyn
,
V. Vysotska
International Conference on Computer Science and…
2015
Corpus ID: 33537732
In this paper presents the development of unified methods and software tools for processing information resources in electronic…
Expand
Highly Cited
2011
Highly Cited
2011
Cloud computing security auditing
I.A. Gul
,
Atiq ur Rehman
,
M. H. Islam
The 2nd International Conference on Next…
2011
Corpus ID: 9137065
In the recent era, cloud computing has evolved as a net centric, service oriented computing model. Consumers purchase computing…
Expand
Highly Cited
2007
Highly Cited
2007
A majority-voting based watermarking scheme for color image tamper detection and recovery
Ming-Shi Wang
,
Wei-Che Chen
Comput. Stand. Interfaces
2007
Corpus ID: 11120466
Highly Cited
2005
Highly Cited
2005
Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach
Simone Leggio
,
J. Manner
,
A. Hulkkonen
,
K. Raatikainen
2005
Corpus ID: 18288758
Ad-hoc networks constitute a peculiar computing environment, characterized by the lack of centralized support from pre-existing…
Expand
Highly Cited
2004
Highly Cited
2004
A steganographic scheme for secure communications based on the chaos and euler Theorem
D. Lou
,
Chia-Hung Sung
IEEE transactions on multimedia
2004
Corpus ID: 12770859
Steganography has been proposed as a methodology for transmitting messages through innocuous covers to conceal their existence…
Expand
Highly Cited
2004
Highly Cited
2004
A Security Architecture for Mobile Wireless Sensor Networks
S. Schmidt
,
Holger Krahn
,
Stefan Fischer
,
D. Wätjen
European Workshop on Security in Ad-hoc and…
2004
Corpus ID: 530631
Wireless sensor networks increasingly become viable solutions to many challenging problems and will successively be deployed in…
Expand
Highly Cited
2002
Highly Cited
2002
A load management system for running HLA-based distributed simulations over the grid
Wentong Cai
,
S. Turner
,
Hanfeng Zhao
Proceedings. Sixth IEEE International Workshop on…
2002
Corpus ID: 27234285
Running a large-scale distributed simulation may need a large amount of computing resources at geographically different locations…
Expand
Highly Cited
1998
Highly Cited
1998
Threshold signature schemes with traceable signers in group communications
Ching-Te Wang
,
Chu-Hsing Lin
,
Chinchen Chang
Computer Communications
1998
Corpus ID: 33317736
Highly Cited
1989
Highly Cited
1989
OSPF specification
Request for Comments
1989
Corpus ID: 37772689
Highly Cited
1980
Highly Cited
1980
Female sex pheromone of rainbow trout, Salmo gairdneri, involved in courtship behavior.
Haruo Honda
1980
Corpus ID: 86045053
It was demonstrated that the male rainbow trout, Salmo gairdneri, were able to discriminate post-ovulatory females from pre…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE