Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,434,866 papers from all fields of science
Search
Sign In
Create Free Account
Credential
Known as:
Credentials
A credential is an attestation of qualification, competence, or authority issued to an individuated by a third party with a relevant or de facto…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
36 relations
Access control
Android Privacy Guard
Atomic authorization
Biometrics
Expand
Broader (1)
Identity management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Phish-IDetector: Message-ID based automatic phishing detection
Rakesh M. Verma
,
N. Rai
International Conference on E-Business and…
2015
Corpus ID: 1445919
Phishing attacks are a well known problem in our age of electronic communication. Sensitive information like credit card details…
Expand
2007
2007
A Secure MANET Routing Protocol with Resilience against Byzantine Behaviours of Malicious or Selfish Nodes
C. Crépeau
,
Carlton R. Davis
,
Muthucumaru Maheswaran
21st International Conference on Advanced…
2007
Corpus ID: 8012579
Secure routing in mobile ad hoc networks (MANETs) has emerged as a important MANET research area. MANETs, by virtue of the fact…
Expand
2005
2005
Redressing the democratic deficit in treaty law making: (Re-) establishing a role for Parliament
J. Harrington
2005
Corpus ID: 158377301
2005
2005
SafeSMS - end-to-end encryption for SMS
M. Hassinen
Proceedings of the 8th International Conference…
2005
Corpus ID: 37872704
Our main contribution is confidentiality, in- tegrity and authentication in SMS (Short Message Services). We will show how to…
Expand
2005
2005
Remaking Career and Technical Education for the 21st Century: What Role for High School Programs?.
R. Kazis
2005
Corpus ID: 150435056
Remaking Career and Technical Education for the 21st Century, based on a paper prepared for the Aspen Institute Education and…
Expand
2005
2005
A high-performance computational resource broker for grid computing environments
Chao-Tung Yang
,
Po-Chi Shih
,
Kuan Ching Li
19th International Conference on Advanced…
2005
Corpus ID: 9114568
Internet computing and grid technologies promise to change the way we tackle complex problems. They will enable large-scale…
Expand
2002
2002
A model of visual, aesthetic communication focusing on web sites
L. Thorlacius
Digital Creativity
2002
Corpus ID: 37348464
Theory books and method books within the field of web design mainly focus on the technical and functional aspects of the…
Expand
2002
2002
The Greening of the European Union?: Examining the Eu's Environmental Credentials
J. Burchell
,
Simon Lightfoot
2002
Corpus ID: 127553142
This book critically examines the European UnionAEs developing relationship with the green agenda, identifying links between the…
Expand
1999
1999
Software smart cards via cryptographic camouflage
D. N. Hoover
,
B. N. Kausik
Proceedings of the IEEE Symposium on Security…
1999
Corpus ID: 7473159
A sensitive point in public key cryptography is how to protect the private key. We outline a method of protecting private keys…
Expand
1980
1980
Diels-Alder reactions using in situ generated quinones
G. Kraus
,
M. Taschner
1980
Corpus ID: 98807531
High-yield syntheses of Diels-Alder adducts involving dienes and unstable quinones can be effected by generating the quinone in…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE