Skip to search formSkip to main contentSkip to account menu

Authentication

Known as: Authenticated copy, AuthN, Auth 
Authentication (from Greek: αὐθεντικός authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
In the recent era, cloud computing has evolved as a net centric, service oriented computing model. Consumers purchase computing… 
Highly Cited
2007
Highly Cited
2005
Highly Cited
2005
Ad-hoc networks constitute a peculiar computing environment, characterized by the lack of centralized support from pre-existing… 
Highly Cited
2004
Highly Cited
2004
Steganography has been proposed as a methodology for transmitting messages through innocuous covers to conceal their existence… 
2003
2003
A virtual organization (VO) is a dynamic collection of distributed resources that are shared by a dynamic collection of users… 
Highly Cited
2002
Highly Cited
2002
Running a large-scale distributed simulation may need a large amount of computing resources at geographically different locations… 
2002
2002
There are two main paradigms for model checking: symbolic model checking, as is performed by the tool RuleBase, and explicit…