Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Message authentication

Known as: Data Authentication, Data authenticity, Message authenticity 
In information security, message authentication or data origin authentication is a property that a message has not been modified while in transit… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
Internet of Things (IoT) is reshaping the incumbent industry to smart industry featured with data-driven decision-making. However… Expand
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Smart grid (SG) communication has recently received significant attentions to facilitate intelligent and distributed electric… Expand
  • figure 1
  • table I
  • figure 2
  • table II
  • figure 3
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Although much research has been conducted in the area of authentication in wireless networks, vehicular ad-hoc networks (VANETs… Expand
  • table I
  • figure 2
  • figure 3
  • table II
  • table III
Is this relevant?
Highly Cited
2008
Highly Cited
2008
In this paper, we introduce a novel roadside unit (RSU)-aided message authentication scheme named RAISE, which makes RSUs… Expand
  • figure 1
  • figure 3
  • table I
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We define and analyze a simple and fully parallelizable blockcipher mode of operation for message authentication… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2000
Highly Cited
2000
  • Ueli Maurer
  • IEEE Trans. Inf. Theory
  • 2000
  • Corpus ID: 16934257
By interpreting message authentication as a hypothesis testing problem, this paper provides a generalized treatment of… Expand
Is this relevant?
Highly Cited
1997
Highly Cited
1997
We describe a construction of almost universal hash functions suitable for very fast software implementation and applicable to… Expand
Is this relevant?
Highly Cited
1996
Highly Cited
1996
There are well-known techniques for message authentication using universal hash functions. This approach seems very promising, as… Expand
Is this relevant?
Highly Cited
1995
Highly Cited
1995
We describe a new approach for authenticating a message using a finite pseudorandom function (PRF). Our "XOR MACs" have several… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
1994
Highly Cited
1994
We present simple and efficient hash functions applicable to secure authentication of information. The constructions are mainly… Expand
Is this relevant?