Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,373,775 papers from all fields of science
Search
Sign In
Create Free Account
Basic access authentication
Known as:
Basic
, BasicAuthenticationScheme
, Http authentication
Expand
In the context of an HTTP transaction basic access authentication is a method for an HTTP user agent to provide a user name and password when making…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
28 relations
.htpasswd
Authentication
Base64
Comparison of web server software
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Managing the security-energy tradeoff in distributed cyber-physical systems
Anh-Duy Vu
,
R. Medhat
,
Borzoo Bonakdarpour
International Conference on Cyber-Physical…
2019
Corpus ID: 102346133
In this paper, we propose a technique that attempts to control energy consumption in distributed cyber-physical systems (CPS) in…
Expand
2019
2019
Towards Fast and Reliable WiFi Authentication by Utilizing Visible Light Diversity
Zhiwei Zhao
,
G. Min
,
Yaoyao Pang
,
Weifeng Gao
,
Jiamei Lv
Annual IEEE Communications Society Conference on…
2019
Corpus ID: 201848421
The openness of indoor WiFi networks makes it prone to spoofing attacks and password leakage/sharing, where undesired users may…
Expand
2017
2017
User Signature Identification and Image Pixel Pattern Verification
N. Srinivasan
2017
Corpus ID: 47790511
Online Internet applications are used widely all over the world. Especially the secured applications like banking and financial…
Expand
2017
2017
Configure a REST message with basic auth
ServiceNow
2017
Corpus ID: 228413123
2012
2012
Membership Models and the Design of Authentication Protocols for MANETs
Soumyadev Maity
,
R. Hansdah
26th International Conference on Advanced…
2012
Corpus ID: 18538261
Authentication protocols are very much essential for secure communication in mobile ad hoc networks (MANETs). A number of…
Expand
2012
2012
DEVELOPMENT OF AN E-OPERATION FRAMEWORK FOR SOPC-BASED RECONFIGURABLE APPLICATIONS
Yh Chang
,
Yt Chen
,
Min-Hsiung Hung
,
A. Chang
2012
Corpus ID: 112295098
In recent years, due to the progress of information and Internet technologies, reconfigurable manufacturing systems have…
Expand
2009
2009
A Robust Grid-Based Key Predistribution Scheme for Sensor Networks
Yen-Hua Liao
,
C. Lei
,
Ai-Nung Wang
International Conference on Innovative Computing…
2009
Corpus ID: 17182813
The grid-based key predistribution scheme in sensor networks has some advantages over the existing approaches. However, since…
Expand
2007
2007
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
Esther Palomar
,
Juan E. Tapiador
,
J. Castro
,
A. Ribagorda
International Conference on Database and Expert…
2007
Corpus ID: 8797300
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the…
Expand
2002
2002
A Proposal for Trust Model: Independent Trust Intermediary Service (ITIS)
Mingchao Ma
,
C. Meinel
International Conference WWW/Internet
2002
Corpus ID: 5862466
Reliable, distributed applications based on Internet, such as e-commerce system rely heavily on trust path among involved parties…
Expand
2001
2001
Classification of video tampering methods and countermeasures using digital watermarking
P. Yin
,
H. H. Yu
SPIE ITCom
2001
Corpus ID: 58718813
The development and spread of multimedia services require authentication techniques to prove the originality and integrity of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE