Skip to search formSkip to main contentSkip to account menu

Message authentication

Known as: Data Authentication, Data authenticity, Message authenticity 
In information security, message authentication or data origin authentication is a property that a message has not been modified while in transit… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
This paper highlights the extension of dwt-svd based image watermarking to medical images. In recent times internet has become a… 
2013
2013
Cloud computing offers a prominent service for data storage known as cloud storage. The flow and storage of data on the cloud… 
2011
2011
ABSTRACT In this paper, a novel watermarking technique is proposed for data authentication and integrity of Relational Database… 
2011
2011
This paper describes the protocol, architecture, and implementation details of an FPGA-based embedded system that is able to… 
2010
2010
647 Abstract-Data authentication and data security are the primary requisites in present day communication systems. In image… 
2007
2007
Secure routing in mobile ad hoc networks (MANETs) has emerged as a important MANET research area. MANETs, by virtue of the fact… 
2007
2007
In Wireless Sensor Networks (WSNs), these sensor nodes cooperate with each other to form a network without using any… 
2005
2005
As wireless ad-hoc networks become feasible, security issues have been important. Because taping and the falsification are easy… 
Review
2003
Review
2003
Most multimedia signals today are in digital formats which are easy to reproduce and modify without any trace of manipulations… 
2000
2000
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that…