Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,059,008 papers from all fields of science
Search
Sign In
Create Free Account
Credential
Known as:
Credentials
A credential is an attestation of qualification, competence, or authority issued to an individuated by a third party with a relevant or de facto…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
36 relations
Access control
Android Privacy Guard
Atomic authorization
Biometrics
Expand
Broader (1)
Identity management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Forensic Taxonomy of Popular Android mHealth Apps
Abdullah Azfar
,
Kim-Kwang Raymond Choo
,
Lin Liu
Americas Conference on Information Systems
2015
Corpus ID: 12002296
Mobile health applications (or mHealth apps, as they are commonly known) are increasingly popular with both individual end users…
Expand
Highly Cited
2011
Highly Cited
2011
Pico: No More Passwords!
F. Stajano
Security Protocols Workshop
2011
Corpus ID: 16190648
From a usability viewpoint, passwords and PINs have reached the end of their useful life. Even though they are convenient for…
Expand
Highly Cited
2009
Highly Cited
2009
Enabling secure service discovery in mobile healthcare enterprise networks
Alessandra Toninelli
,
R. Montanari
,
Antonio Corradi
IEEE wireless communications
2009
Corpus ID: 206490535
Advances in wireless networks, sensors, and portable devices offer unique chances to deliver novel anytime anywhere medical…
Expand
Highly Cited
2008
Highly Cited
2008
Protecting Financial Institutions from Brute-Force Attacks
Cormac Herley
,
D. Florêncio
IFIP International Information Security…
2008
Corpus ID: 17921535
We examine the problem of protecting online banking accounts from password brute-forcing attacks. Our method is to create a large…
Expand
Highly Cited
2006
Highly Cited
2006
Models of Success Versus the Success of Models: Reliability without Truth
Eric Winsberg
Synthese
2006
Corpus ID: 18275928
In computer simulations of physical systems, the construction of models is guided, but not determined, by theory. At the same…
Expand
Review
2005
Review
2005
Changing school loyalties and the middle class: A reflection on the developing fate of state comprehensive high schooling
C. Campbell
2005
Corpus ID: 143408807
Of all Australian secondary schools in the current period, the government comprehensive high school is in most difficulty. This…
Expand
Review
2001
Review
2001
Cold atoms in space and atomic clocks: ACES
C. Salomon
,
N. Dimarcq
,
+17 authors
S. Feltham
2001
Corpus ID: 53366237
Highly Cited
2000
Highly Cited
2000
A security architecture for mobile agents in Ajanta
Neeran M. Karnik
,
A. Tripathi
Proceedings 20th IEEE International Conference on…
2000
Corpus ID: 30219771
A mobile agent represents a computation that can autonomously migrate in a network to perform tasks on behalf of its creator…
Expand
Review
1999
Review
1999
Airline in-flight entertainment: the passengers’ perspective
F. Alamdari
1999
Corpus ID: 53141991
Highly Cited
1996
Highly Cited
1996
Audience and Voice in Current L1 Composition Texts: Some Implications for ESL Student Writers.
V. Ramanathan
,
R. Kaplan
1996
Corpus ID: 53142127
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE