Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Basic access authentication

Known as: Basic, BasicAuthenticationScheme, Http authentication 
In the context of an HTTP transaction basic access authentication is a method for an HTTP user agent to provide a user name and password when making… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
Wireless sensors and actuators connected by the Internet-of-Things (IoT) are central to the design of advanced cyber–physical… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 5
2017
2017
An effective and secure authentication mechanism is one of the important part in implementation of communication protocol in a… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 9
Highly Cited
2016
Highly Cited
2016
While modern block ciphers, such as AES, have a block size of at least 128 bits, there are many 64-bit block ciphers, such as… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 3
Highly Cited
2013
Highly Cited
2013
With the popularity of location-based services and the abundant usage of smart phones and GPS-enabled devices, the necessity of… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2010
Highly Cited
2010
Hopper and Blum (Asiacrypt 2001) and Juels and Weis (Crypto 2005) recently proposed two shared-key authentication protocols—HB… Expand
  • figure 1
  • figure 2
2010
2010
As wireless LANs as well as the high-speed broadband Internet service are widely deployed, the VoIP service has become popular… Expand
  • figure 1
  • table I
2007
2007
Most users have multiple accounts on the Internet where each account is protected by a password. To avoid the headache in… Expand
  • figure 2
  • figure 1
  • figure 3
Highly Cited
1999
Highly Cited
1999
"HTTP/1.0", includes the specification for a Basic Access Authentication scheme. This scheme is not considered to be a secure… Expand
Highly Cited
1999
Highly Cited
1999
  • C. Perkins, K. Wang
  • Proceedings IEEE International Symposium on…
  • 1999
  • Corpus ID: 16794626
Mobile IP provides mobility support for hosts connected to the Internet without changing their IP addresses. Route optimization… Expand
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Highly Cited
1997
Highly Cited
1997
The protocol referred to as "HTTP/1.0" includes the specification for a Basic Access Authentication scheme. This scheme is not… Expand