Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,536,296 papers from all fields of science
Search
Sign In
Create Free Account
Basic access authentication
Known as:
Basic
, BasicAuthenticationScheme
, Http authentication
Expand
In the context of an HTTP transaction basic access authentication is a method for an HTTP user agent to provide a user name and password when making…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
28 relations
.htpasswd
Authentication
Base64
Comparison of web server software
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Towards Fast and Reliable WiFi Authentication by Utilizing Visible Light Diversity
Zhiwei Zhao
,
G. Min
,
Yaoyao Pang
,
Weifeng Gao
,
Jiamei Lv
Annual IEEE Communications Society Conference on…
2019
Corpus ID: 201848421
The openness of indoor WiFi networks makes it prone to spoofing attacks and password leakage/sharing, where undesired users may…
Expand
2017
2017
Improving User Identification for WiFi Networks Using Visible Light Based Authentication
Zhiwei Zhao
,
Yaoyao Pang
,
Feiyu Chen
,
G. Min
,
Wei Dong
2017
Corpus ID: 196138478
The openness of indoor WiFi networks makes it prone to spoofing attacks and password sharing, where undesired users may be able…
Expand
2017
2017
User Signature Identification and Image Pixel Pattern Verification
N. Srinivasan
2017
Corpus ID: 47790511
Online Internet applications are used widely all over the world. Especially the secured applications like banking and financial…
Expand
2015
2015
HTTP Origin-Bound Authentication (HOBA)
S. Farrell
,
P. Hoffman
,
Michael Thomas
Request for Comments
2015
Corpus ID: 36443224
HTTP Origin-Bound Authentication (HOBA) is a digital-signature-based design for an HTTP authentication method. The design can…
Expand
2010
2010
Basic authentication procedure modelled by Petri nets
J. Čapek
,
Miloslav Hub
,
Renáta Mysková
2010
Corpus ID: 61378815
This paper presents modelling of the basic authentication procedure. The Petri net technique as a tool was chosen in this study…
Expand
2007
2007
Location based spatial queries in mobile environments
Roger Zimmermann
,
Wei-Shinn Ku
2007
Corpus ID: 14735182
Location-dependent queries, such as determining the proximity of points of interest (e.g., hotels, gas stations) to a mobile host…
Expand
2006
2006
HTTP Authentication Scheme Based on Public Key Certificate
Lv Shuwang
2006
Corpus ID: 203676128
The paper introduces a HTTP authentication scheme based on X.509 certificate(called Cert-X.509 scheme).Then it defines the…
Expand
2006
2006
SPNEGO-based Kerberos and NTLM HTTP Authentication in Microsoft Windows
K. Jaganathan
,
Larry Zhu
,
J. Brezak
Request for Comments
2006
Corpus ID: 41554466
This document describes how the Microsoft Internet Explorer (MSIE) and Internet Information Services (IIS) incorporated in…
Expand
2003
2003
HTTP Authentication: Kerberos Authentication As implemented in Microsoft Windows 2000
J. Brezak
2003
Corpus ID: 215934734
2002
2002
A Proposal for Trust Model: Independent Trust Intermediary Service (ITIS)
Mingchao Ma
,
C. Meinel
International Conference WWW/Internet
2002
Corpus ID: 5862466
Reliable, distributed applications based on Internet, such as e-commerce system rely heavily on trust path among involved parties…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE