Skip to search formSkip to main contentSkip to account menu

Authentication

Known as: Authenticated copy, AuthN, Auth 
Authentication (from Greek: αὐθεντικός authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
In this paper presents the development of unified methods and software tools for processing information resources in electronic… 
Highly Cited
2011
Highly Cited
2011
In the recent era, cloud computing has evolved as a net centric, service oriented computing model. Consumers purchase computing… 
Highly Cited
2007
Highly Cited
2005
Highly Cited
2005
Ad-hoc networks constitute a peculiar computing environment, characterized by the lack of centralized support from pre-existing… 
Highly Cited
2004
Highly Cited
2004
Steganography has been proposed as a methodology for transmitting messages through innocuous covers to conceal their existence… 
2003
2003
A virtual organization (VO) is a dynamic collection of distributed resources that are shared by a dynamic collection of users… 
Highly Cited
2002
Highly Cited
2002
Running a large-scale distributed simulation may need a large amount of computing resources at geographically different locations… 
2002
2002
There are two main paradigms for model checking: symbolic model checking, as is performed by the tool RuleBase, and explicit…