Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,261,029 papers from all fields of science
Search
Sign In
Create Free Account
Basic access authentication
Known as:
Basic
, BasicAuthenticationScheme
, Http authentication
Expand
In the context of an HTTP transaction basic access authentication is a method for an HTTP user agent to provide a user name and password when making…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
28 relations
.htpasswd
Authentication
Base64
Comparison of web server software
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Managing the security-energy tradeoff in distributed cyber-physical systems
Anh-Duy Vu
,
R. Medhat
,
Borzoo Bonakdarpour
International Conference on Cyber-Physical…
2019
Corpus ID: 102346133
In this paper, we propose a technique that attempts to control energy consumption in distributed cyber-physical systems (CPS) in…
Expand
2017
2017
Authentication for the web of things: Secure end-to-end authentication between CoAP and HTTP
Marian Buschsieweke
,
M. Günes
IEEE International Symposium on Personal, Indoor…
2017
Corpus ID: 3422439
Both access control and interoperability with the legacy Internet are crucial for broad adoption of technologies in the IoT…
Expand
2012
2012
DEVELOPMENT OF AN E-OPERATION FRAMEWORK FOR SOPC-BASED RECONFIGURABLE APPLICATIONS
Yh Chang
,
Yt Chen
,
Min-Hsiung Hung
,
A. Chang
2012
Corpus ID: 112295098
In recent years, due to the progress of information and Internet technologies, reconfigurable manufacturing systems have…
Expand
2012
2012
Membership Models and the Design of Authentication Protocols for MANETs
Soumyadev Maity
,
R. Hansdah
26th International Conference on Advanced…
2012
Corpus ID: 18538261
Authentication protocols are very much essential for secure communication in mobile ad hoc networks (MANETs). A number of…
Expand
2012
2012
FACIUS: An Easy-to-Deploy SAML-based Approach to Federate Non Web-Based Services
Jens Köhler
,
Sebastian Labitzke
,
Michael Simon
,
M. Nussbaumer
,
H. Hartenstein
IEEE 11th International Conference on Trust…
2012
Corpus ID: 14731479
Federated identity management yields many advantages such as enhanced usability and improved quality of identity information. Web…
Expand
2010
2010
Detecting Anomaly Traffic using Flow Data in the real VoIP network
Hyeongu Son
,
Youngseok Lee
10th IEEE/IPSJ International Symposium on…
2010
Corpus ID: 12620452
As wireless LANs as well as the high-speed broadband Internet service are widely deployed, the VoIP service has become popular…
Expand
2009
2009
An extended UsernameToken-based approach for REST-style Web Service Security Authentication
Dunlu Peng
,
Chen Li
,
Huan Huo
International Conference on Computer Science and…
2009
Corpus ID: 17549444
Web service security is essential for SOA-based applications. Based on the analysis of the two existing authentications of REST…
Expand
2007
2007
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
Esther Palomar
,
Juan E. Tapiador
,
J. Castro
,
A. Ribagorda
International Conference on Database and Expert…
2007
Corpus ID: 8797300
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the…
Expand
2002
2002
A Proposal for Trust Model: Independent Trust Intermediary Service (ITIS)
Mingchao Ma
,
C. Meinel
International Conference WWW/Internet
2002
Corpus ID: 5862466
Reliable, distributed applications based on Internet, such as e-commerce system rely heavily on trust path among involved parties…
Expand
2001
2001
Classification of video tampering methods and countermeasures using digital watermarking
P. Yin
,
H. H. Yu
SPIE ITCom
2001
Corpus ID: 58718813
The development and spread of multimedia services require authentication techniques to prove the originality and integrity of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE