Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Ident protocol

Known as: Identd, Identification protocol, Port 113 
The Ident Protocol (Identification Protocol, IDENT), specified in , is an Internet protocol that helps identify the user of a particular TCP… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Abstract. We present a model for attacking various cryptographic schemes by taking advantage of random hardware faults. The model… Expand
Is this relevant?
2011
2011
The curing of the LY556 epoxy system, a DGEBA-type epoxy resin with an anhydride hardener HY917 and a l-methyl imidazole DY 070… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 6
Is this relevant?
Highly Cited
2010
Highly Cited
2010
We present a privacy preserving protocol for fingerprint-based authentication. We consider a scenario where a client equipped… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2010
Highly Cited
2010
We introduce SCiFI, a system for Secure Computation of Face Identification. The system performs face identification which… Expand
  • figure 1
  • table I
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Proofs of storage (PoS) are interactive protocols allowing a client to verify that a server faithfully stores a file. Previous… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2008
Highly Cited
2008
There is an inherent difficulty in building 3-move ID schemes based on combinatorial problems without much algebraic structure. A… Expand
  • figure 1
  • figure 2
Is this relevant?
2000
2000
  • Paul Grünbacher
  • Proceedings 11th International Workshop on…
  • 2000
  • Corpus ID: 1200469
The EasyWinWin methodology supports collaborative elaboration, prioritization, and negotiation of system requirements. The… Expand
  • figure 1
  • figure 2
  • figure 4
  • table 1
Is this relevant?
Highly Cited
1990
Highly Cited
1990
ABSTRACTIn this article the construct of generalized expectancies for internal versus external control of reinforcement is used… Expand
Is this relevant?
Highly Cited
1989
Highly Cited
1989
A precise definition is provided for general configuration tasks. Two important assumptions are identified: (i) functional… Expand
Is this relevant?
Highly Cited
1989
Highly Cited
1989
Suppose a new high growth segment opens up in your industry. Should you enter that segment? Many other firms are likely to enter… Expand
Is this relevant?