Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,647,553 papers from all fields of science
Search
Sign In
Create Free Account
Login
Known as:
Signing in
, Log in
, Logged in
Expand
In computer security, logging in, (or logging on or signing in or signing on), is the process by which an individual gains access to a computer…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Access control
Access token
Active Directory
Authentication
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Building Cloud-based Biometric Services
P. Peer
,
J. Bule
,
Jerneja Zganec-Gros
,
V. Štruc
Informatica
2013
Corpus ID: 476630
Over the next few years the amount of biometric data being at the disposal of various agencies and authentication service…
Expand
Highly Cited
2008
Highly Cited
2008
History and Present Scope of Field Studies on Macaca fuscata yakui at Yakushima Island, Japan
J. Yamagiwa
International journal of primatology
2008
Corpus ID: 27141377
Field studies on Japanese macaques on Yakushima Island started in the mid-1970s, >25 yr after the emergence of Japanese…
Expand
Review
2007
Review
2007
The persistence and conservation of Borneo’s mammals in lowland rain forests managed for timber: observations, overviews and opportunities
Erik Meijaard
,
Douglas Sheil
,
Douglas Sheil
Ecological research
2007
Corpus ID: 10284340
Lowland rainforests on Borneo are being degraded and lost at an alarming rate. Studies on mammals report species responding in…
Expand
Review
2007
Review
2007
A Second Life for Your Museum: 3D Multi-User Virtual Environments and Museums
R. Urban
2007
Corpus ID: 60016010
The paper gives an overview of some of the museum-like activities currently being undertaken in Second Life. Current development…
Expand
Highly Cited
2004
Highly Cited
2004
A smart card-based remote scheme for password authentication in multi-server Internet services
Woei-Jiunn Tsaur
,
Chia-Chun Wu
,
Wei-Bin Lee
Comput. Stand. Interfaces
2004
Corpus ID: 5067660
Highly Cited
2004
Highly Cited
2004
Evaluation of Korean food waste composting with fed-batch operations I: using water extractable total organic carbon contents (TOCw)
Sung-hwan Kwon
,
D. H. Lee
2004
Corpus ID: 53129672
Highly Cited
2002
Highly Cited
2002
A load management system for running HLA-based distributed simulations over the grid
Wentong Cai
,
S. Turner
,
Hanfeng Zhao
Proceedings. Sixth IEEE International Workshop on…
2002
Corpus ID: 27234285
Running a large-scale distributed simulation may need a large amount of computing resources at geographically different locations…
Expand
Highly Cited
1989
Highly Cited
1989
Compatibility Among Host-Specialized Isolates of Heterobasidion annosum from Western North America
T. Harrington
,
J. Worrall
,
D. Rizzo
1989
Corpus ID: 2783254
Harrington, T. C., Worrall, J. J., and Rizzo, D. M. 1989. Compatibility among host-specialized isolates of Heterobasidion annosum…
Expand
Review
1979
Review
1979
Local position of Fe 3+ in ferroelectric BaTiO 3
E. Siegel
,
K. Muller
1979
Corpus ID: 43526734
-The EPR spectra of Fe3+ in the three ferroelectric phases of BaTi03 could be interpreted on the basis of the Newman…
Expand
Highly Cited
1935
Highly Cited
1935
Propagation of Radio Waves over a Plane Earth
K. Norton
Nature
1935
Corpus ID: 4129255
THE purpose of this letter is to point out an error in sign in Prof. A. Sommerfeld's original paper (1909) on the attenuation of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE