Skip to search formSkip to main contentSkip to account menu

Message authentication

Known as: Data Authentication, Data authenticity, Message authenticity 
In information security, message authentication or data origin authentication is a property that a message has not been modified while in transit… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
An Aggregate Signature based Trust Routing (ASTR) scheme is proposed to guarantee safe data collection in WSNs. In ASTR scheme… 
2014
2014
This paper highlights the extension of dwt-svd based image watermarking to medical images. In recent times internet has become a… 
2013
2013
Cloud computing offers a prominent service for data storage known as cloud storage. The flow and storage of data on the cloud… 
2012
2012
Integrity and authenticity are important issues in biometrics security. Digital image forensics have shown that the integrity and… 
2011
2011
An Underwater Acoustic Network (UAN) raises many issues in terms of security. In this paper we focus on attacks performed during… 
2011
2011
The blood circulation system in a human body provides a unique and natural trust zone for secure data communications in wireless… 
2010
2010
Continuing achievements in hardware technology are bringing ubiquitous computing closer to reality. The notion of a connected… 
2010
2010
In today's world, most of the means of secure data and code storage and distribution rely on using cryptographic schemes, such as… 
Highly Cited
2007
Highly Cited
2007
Wireless sensor networks (WSNs) are becoming more and more common. WSNs have many existing and envisioned applications due to… 
Highly Cited
1987
Highly Cited
1987
In the most general model of message authentication, there are four essential participants: a transmitter who observes an…