Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,595,918 papers from all fields of science
Search
Sign In
Create Free Account
Message authentication
Known as:
Data Authentication
, Data authenticity
, Message authenticity
Expand
In information security, message authentication or data origin authentication is a property that a message has not been modified while in transit…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
Authenticated encryption
Authentication
Data integrity
Deniable authentication
Expand
Broader (1)
Error detection and correction
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
An Aggregate Signature Based Trust Routing for Data Gathering in Sensor Networks
Jiawei Tang
,
Anfeng Liu
,
Ming Zhao
,
Tian Wang
Secur. Commun. Networks
2018
Corpus ID: 3418277
An Aggregate Signature based Trust Routing (ASTR) scheme is proposed to guarantee safe data collection in WSNs. In ASTR scheme…
Expand
2014
2014
Blind Medical Image Watermarking with LWT – SVD for Telemedicine Applications
N. Venkatram
,
L. Reddy
,
P. Kishore
2014
Corpus ID: 12150234
This paper highlights the extension of dwt-svd based image watermarking to medical images. In recent times internet has become a…
Expand
2013
2013
Enhanced Security Architecture for Cloud Data Security
C. Kant
,
Yogesh Sharma
2013
Corpus ID: 6865247
Cloud computing offers a prominent service for data storage known as cloud storage. The flow and storage of data on the cloud…
Expand
2012
2012
Iris-sensor authentication using camera PRNU fingerprints
A. Uhl
,
Y. Höller
International Conference on Biometrics
2012
Corpus ID: 31143827
Integrity and authenticity are important issues in biometrics security. Digital image forensics have shown that the integrity and…
Expand
2011
2011
SeFLOOD: A secure network discovery protocol for Underwater Acoustic Networks
G. Dini
,
A. L. Duca
International Symposium on Computers and…
2011
Corpus ID: 22811390
An Underwater Acoustic Network (UAN) raises many issues in terms of security. In this paper we focus on attacks performed during…
Expand
2011
2011
Secure Stochastic ECG Signals Based on Gaussian Mixture Model for $e$-Healthcare Systems
Wei Wang
,
Honggang Wang
,
M. Hempel
,
Dongming Peng
,
H. Sharif
,
Hsiao-Hwa Chen
IEEE Systems Journal
2011
Corpus ID: 895059
The blood circulation system in a human body provides a unique and natural trust zone for secure data communications in wireless…
Expand
2010
2010
Low-cost digital signature architecture suitable for radio frequency identification tags
Máire O’Neill
,
M. Robshaw
IET Computers & Digital Techniques
2010
Corpus ID: 5397229
Continuing achievements in hardware technology are bringing ubiquitous computing closer to reality. The notion of a connected…
Expand
2010
2010
Block Encryption Standard for Transfer of data
A. Kaushik
,
Anant Kumar
,
Manoj Barnela
International Conference on Networking and…
2010
Corpus ID: 12652570
In today's world, most of the means of secure data and code storage and distribution rely on using cryptographic schemes, such as…
Expand
Highly Cited
2007
Highly Cited
2007
Reputation-based Trust in Wireless Sensor Networks
Haiguang Chen
,
Huafeng Wu
,
Xi Zhou
,
Chuanshan Gao
International Conference on Multimedia and…
2007
Corpus ID: 25017877
Wireless sensor networks (WSNs) are becoming more and more common. WSNs have many existing and envisioned applications due to…
Expand
Highly Cited
1987
Highly Cited
1987
Message Authentication with Arbitration of Transmitter/Receiver Disputes
G. J. Simmons
International Conference on the Theory and…
1987
Corpus ID: 36233112
In the most general model of message authentication, there are four essential participants: a transmitter who observes an…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE