Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,624,527 papers from all fields of science
Search
Sign In
Create Free Account
Message authentication code
Known as:
Message footprint
, MIC
, Keyed hash function
Expand
In cryptography, a message authentication code (MAC) is a short piece of information used to authenticate a message—in other words, to confirm that…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
ANSI ASC X9.95 Standard
Authenticated encryption
Block cipher
Block cipher mode of operation
Expand
Broader (1)
Error detection and correction
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Simulation and cost analysis of group authentication protocols
Adarsh Kumar
,
K. Gopal
,
A. Aggarwal
International Conference on Contemporary…
2016
Corpus ID: 15699689
Radio Frequency Identification (RFID) is an efficient technology for identification, tracking and group proof construction. The…
Expand
2015
2015
On priority assignment for controller area network when some message identifiers are fixed
Robert I. Davis
,
A. Burns
,
Victor Pollex
,
F. Slomka
International Conference on Real-Time and Network…
2015
Corpus ID: 15030793
Controller Area Network (CAN) is widely used in automotive applications. With CAN, the network utilisation that may be obtained…
Expand
2014
2014
Multi-sender Broadcast Authentication in Wireless Sensor Networks
Ya Gao
,
Peng Zeng
,
Kim-Kwang Raymond Choo
Tenth International Conference on Computational…
2014
Corpus ID: 17687759
Broadcast authentication, a fundamental feature in wireless sensor networks (WSNs), enables users to broadcast to multiple sensor…
Expand
2013
2013
A Recent Approach to Organise Structured Data in Mobile Environment
R. Jegadeesan
,
Dr.N.Sankar Ram
,
R. Janakiraman
2013
Corpus ID: 18635898
A Novel Approach To Organize Structured Data In Mobile Devices propounds an ISAMD (Improved Synchronization Algorithm based on…
Expand
Review
2012
Review
2012
Hiding the Text Information using Stegnography
M. G. Grace Vennice
,
M. Rao
,
+6 authors
Prof J Sasi
2012
Corpus ID: 17409837
-The Often Distribution of encrypted messages will depict the concentration of third parties. The attempts can be made to break…
Expand
2010
2010
Securing Iris Templates using Combined User and Soft Biometric based Password Hardened Fuzzy Vault
V. Meenakshi
,
G. Padmavathi
arXiv.org
2010
Corpus ID: 18150320
Personal identification and authentication is very crucial in the current scenario. Biometrics plays an important role in this…
Expand
2006
2006
Approximate Message Authentication Codes for$N$-ary Alphabets
Renwei Ge
,
G. Arce
,
G. D. Crescenzo
IEEE Transactions on Information Forensics and…
2006
Corpus ID: 9006214
Approximate message authentication codes (AMACs) for binary alphabets have been introduced recently as noise-tolerant…
Expand
2005
2005
TCP Message Authentication Code Option
B. Weis
2005
Corpus ID: 63419157
This memo describes a TCP [RFC0793] extension to enhance security for BGP [I-D.ietf-idr-bgp4] and other TCP-based protocols…
Expand
2002
2002
Embedding stego-text in cover images using linked list concepts and LSB technique
M. Nosrati
,
R. Karimi
,
Hamed Nosrati
,
A. Nosrati
2002
Corpus ID: 11175288
: In this paper, we intend to introduce a steganography algorithm for embedding a message into a RGB 24-bit color image. It will…
Expand
2001
2001
Wireless networking with a PDA: the Ward-In-Hand project
G. Dodero
2001
Corpus ID: 73635779
Abstract The paper briefly describes Ward-In-Hand, aproject aiming to support the day-by-dayactivities of doctors and nurses…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE