Skip to search formSkip to main contentSkip to account menu

Authentication

Known as: Authenticated copy, AuthN, Auth 
Authentication (from Greek: αὐθεντικός authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2009
Highly Cited
2009
This paper proposes a method for detecting copy-move forgery over images tampered by copy-move. To detect such forgeries, the… 
Highly Cited
2008
Highly Cited
2008
This paper intends to propose a novel control algorithm for utilizing a polymer electrolyte membrane fuel cell (PEMFC) as a main… 
Highly Cited
2004
Highly Cited
2004
This paper presents the theoretical blueprint of a new secure token called the Externalized Microprocessor (X μ P). Unlike a… 
Highly Cited
2001
Highly Cited
2001
During May 1998, the Center for Analysis and Prediction of Storms (CAPS) at the University of Oklahoma coordinated a multi… 
Highly Cited
1998
Highly Cited
1998
This article summarizes the results of the BARWAN project, which focused on enabling truly useful mobile networking across an… 
Highly Cited
1975
Highly Cited
1975
Some of the threats to the integrity of multiuser teleprocessing systems and to the data they contain can be countered by the use…