Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,616,136 papers from all fields of science
Search
Sign In
Create Free Account
Message authentication
Known as:
Data Authentication
, Data authenticity
, Message authenticity
Expand
In information security, message authentication or data origin authentication is a property that a message has not been modified while in transit…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
Authenticated encryption
Authentication
Data integrity
Deniable authentication
Expand
Broader (1)
Error detection and correction
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Blind Medical Image Watermarking with LWT – SVD for Telemedicine Applications
N. Venkatram
,
L. Reddy
,
P. Kishore
2014
Corpus ID: 12150234
This paper highlights the extension of dwt-svd based image watermarking to medical images. In recent times internet has become a…
Expand
2013
2013
Enhanced Security Architecture for Cloud Data Security
C. Kant
,
Yogesh Sharma
2013
Corpus ID: 6865247
Cloud computing offers a prominent service for data storage known as cloud storage. The flow and storage of data on the cloud…
Expand
2011
2011
A New Watermarking Approach for Non-numeric Relational Database
R. Bedi
,
Anita M. Thengade
,
V. Wadhai
2011
Corpus ID: 16758752
ABSTRACT In this paper, a novel watermarking technique is proposed for data authentication and integrity of Relational Database…
Expand
2011
2011
Secure remote reconfiguration of an FPGA-based embedded system
An Braeken
,
Jan Genoe
,
+6 authors
K. Wouters
Reconfigurable Communication-centric Systems-on…
2011
Corpus ID: 8059732
This paper describes the protocol, architecture, and implementation details of an FPGA-based embedded system that is able to…
Expand
2010
2010
A Comparative Study on Performance of Novel, Robust Spatial Domain Digital Image Watermarking with DCT Based Watermarking
R. K. Megalingam
,
M. Nair
,
R. Srikumar
,
Venkat Krishnan Balasubramanian
,
V. Sarma
2010
Corpus ID: 53666716
647 Abstract-Data authentication and data security are the primary requisites in present day communication systems. In image…
Expand
2007
2007
A Secure MANET Routing Protocol with Resilience against Byzantine Behaviours of Malicious or Selfish Nodes
C. Crépeau
,
Carlton R. Davis
,
Muthucumaru Maheswaran
21st International Conference on Advanced…
2007
Corpus ID: 8012579
Secure routing in mobile ad hoc networks (MANETs) has emerged as a important MANET research area. MANETs, by virtue of the fact…
Expand
2007
2007
Reputation and Trust Mathematical Approach for Wireless Sensor Networks
Haiguang Chen
,
G. Gu
,
Huafeng Wu
,
Chuanshan Gao
2007
Corpus ID: 14408225
In Wireless Sensor Networks (WSNs), these sensor nodes cooperate with each other to form a network without using any…
Expand
2005
2005
Message authentication scheme for mobile ad hoc networks
F. Sato
,
H. Takahira
,
T. Mizuno
International Conference on Parallel and…
2005
Corpus ID: 17161295
As wireless ad-hoc networks become feasible, security issues have been important. Because taping and the falsification are easy…
Expand
Review
2003
Review
2003
Multimedia Authentication and Watermarking
Bin B. Zhu
,
M. D. Swanson
2003
Corpus ID: 58150592
Most multimedia signals today are in digital formats which are easy to reproduce and modify without any trace of manipulations…
Expand
2000
2000
Internet Engineering Task Force IETF MSEC Internet Draft Perrig
Briscoe Perrig
,
Page
2000
Corpus ID: 59791043
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE