Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,244,048 papers from all fields of science
Search
Sign In
Create Free Account
Basic access authentication
Known as:
Basic
, BasicAuthenticationScheme
, Http authentication
Expand
In the context of an HTTP transaction basic access authentication is a method for an HTTP user agent to provide a user name and password when making…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
28 relations
.htpasswd
Authentication
Base64
Comparison of web server software
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Managing the security-energy tradeoff in distributed cyber-physical systems
Anh-Duy Vu
,
R. Medhat
,
Borzoo Bonakdarpour
International Conference on Cyber-Physical…
2019
Corpus ID: 102346133
In this paper, we propose a technique that attempts to control energy consumption in distributed cyber-physical systems (CPS) in…
Expand
2019
2019
Towards Fast and Reliable WiFi Authentication by Utilizing Visible Light Diversity
Zhiwei Zhao
,
G. Min
,
Yaoyao Pang
,
Weifeng Gao
,
Jiamei Lv
Annual IEEE Communications Society Conference on…
2019
Corpus ID: 201848421
The openness of indoor WiFi networks makes it prone to spoofing attacks and password leakage/sharing, where undesired users may…
Expand
2017
2017
Configure a REST message with basic auth
ServiceNow
2017
Corpus ID: 228413123
2017
2017
Improving User Identification for WiFi Networks Using Visible Light Based Authentication
Zhiwei Zhao
,
Yaoyao Pang
,
Feiyu Chen
,
G. Min
,
Wei Dong
2017
Corpus ID: 196138478
The openness of indoor WiFi networks makes it prone to spoofing attacks and password sharing, where undesired users may be able…
Expand
2012
2012
DEVELOPMENT OF AN E-OPERATION FRAMEWORK FOR SOPC-BASED RECONFIGURABLE APPLICATIONS
Yh Chang
,
Yt Chen
,
Min-Hsiung Hung
,
A. Chang
2012
Corpus ID: 112295098
In recent years, due to the progress of information and Internet technologies, reconfigurable manufacturing systems have…
Expand
2009
2009
A Robust Grid-Based Key Predistribution Scheme for Sensor Networks
Yen-Hua Liao
,
C. Lei
,
Ai-Nung Wang
International Conference on Innovative Computing…
2009
Corpus ID: 17182813
The grid-based key predistribution scheme in sensor networks has some advantages over the existing approaches. However, since…
Expand
2006
2006
HTTP Authentication Scheme Based on Public Key Certificate
Lv Shuwang
2006
Corpus ID: 203676128
The paper introduces a HTTP authentication scheme based on X.509 certificate(called Cert-X.509 scheme).Then it defines the…
Expand
2003
2003
HTTP Authentication: Kerberos Authentication As implemented in Microsoft Windows 2000
J. Brezak
2003
Corpus ID: 215934734
2002
2002
A Proposal for Trust Model: Independent Trust Intermediary Service (ITIS)
Mingchao Ma
,
C. Meinel
International Conference WWW/Internet
2002
Corpus ID: 5862466
Reliable, distributed applications based on Internet, such as e-commerce system rely heavily on trust path among involved parties…
Expand
2001
2001
Classification of video tampering methods and countermeasures using digital watermarking
P. Yin
,
H. H. Yu
SPIE ITCom
2001
Corpus ID: 58718813
The development and spread of multimedia services require authentication techniques to prove the originality and integrity of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE