Login

Known as: Signing in, Log in, Logged in 
In computer security, logging in, (or logging on or signing in or signing on), is the process by which an individual gains access to a computer… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Research has brought forth a variety of authentication systems to mitigate observation attacks. However, there is little work… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
  • 2006
THE usefulness of the electrical resistivity log in determining reservoir characteristics is governed largely by: (I) the… (More)
  • figure I
  • figure 2
  • table I
  • table 2
  • figure 4
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Current computational approaches to learning visual object categories require thousands of training images, are slow, cannot… (More)
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Adequate user authentication is a persistent problem, particularly with handheld devices such as Personal Digital Assistants… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2000
Highly Cited
2000
In the 1990s the concept of social capital—defined here as the norms and networks that enable people to act collectively—enjoyed… (More)
  • figure 1
  • table 1
  • figure 2
  • table 2
Is this relevant?
Highly Cited
1998
Highly Cited
1998
The keystroke dynamics of a computer user’s login string provide a characteristic pattern that can be used for identity… (More)
  • figure 1
  • table I
  • table II
  • table III
  • table IV
Is this relevant?
Highly Cited
1998
Highly Cited
1998
If not only are polynomial time but also work very well in with your. These optimization is combined with system and arkadii… (More)
Is this relevant?
Highly Cited
1996
Highly Cited
1996
  • Vipin Samar
  • ACM Conference on Computer and Communications…
  • 1996
Since authentication mechanisms constantly evolve, it is important to shield the system-entry services and users from such… (More)
  • figure 1
  • table 2
  • table 3
  • figure 2
  • table 4
Is this relevant?
Highly Cited
1996
Highly Cited
1996
SSH provides secure login, le transfer, X11, and TCP/IP connections over an untrusted network. It uses cryptographic… (More)
Is this relevant?
Highly Cited
1986
Highly Cited
1986
D An elaboration of the PROLOG language is described in which the notion of first-order term is replaced by a more general one… (More)
  • figure 2
  • figure 3
  • figure 6
  • figure 9
  • figure 8
Is this relevant?