Skip to search formSkip to main contentSkip to account menu

Message authentication

Known as: Data Authentication, Data authenticity, Message authenticity 
In information security, message authentication or data origin authentication is a property that a message has not been modified while in transit… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
In cloud computing, data owners host their data on cloud servers, and users (data consumers) can access the data from the cloud… 
2014
2014
This paper highlights the extension of dwt-svd based image watermarking to medical images. In recent times internet has become a… 
2013
2013
Cloud computing offers a prominent service for data storage known as cloud storage. The flow and storage of data on the cloud… 
2012
2012
Integrity and authenticity are important issues in biometrics security. Digital image forensics have shown that the integrity and… 
2011
2011
The blood circulation system in a human body provides a unique and natural trust zone for secure data communications in wireless… 
2011
2011
ABSTRACT In this paper, a novel watermarking technique is proposed for data authentication and integrity of Relational Database… 
2010
2010
In today's world, most of the means of secure data and code storage and distribution rely on using cryptographic schemes, such as… 
2010
2010
Continuing achievements in hardware technology are bringing ubiquitous computing closer to reality. The notion of a connected… 
2007
2007
Secure routing in mobile ad hoc networks (MANETs) has emerged as a important MANET research area. MANETs, by virtue of the fact… 
Highly Cited
1987
Highly Cited
1987
In the most general model of message authentication, there are four essential participants: a transmitter who observes an…