Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,084,871 papers from all fields of science
Search
Sign In
Create Free Account
Closed-loop authentication
Closed-loop authentication, as applied to computer network communication, refers to a mechanism whereby one party verifies the purported identity of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Authentication
Cryptographic nonce
Cryptography
Digital identity
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2009
2009
Authentication: Packaging and labeling, Provenance, Two-factor authentication, Chip Authentication Program, Closed-loop authentication, Authorization, CAPTCHA, Diameter (protocol)
Frederic P. Miller
,
Agnes F. Vandome
,
John McBrewster
2009
Corpus ID: 62419991
Authentication is the act of establishing or confirming something (or someone) as authentic, that is, that claims made by or…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE