Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,475,740 papers from all fields of science
Search
Sign In
Create Free Account
Message authentication
Known as:
Data Authentication
, Data authenticity
, Message authenticity
Expand
In information security, message authentication or data origin authentication is a property that a message has not been modified while in transit…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
Authenticated encryption
Authentication
Data integrity
Deniable authentication
Expand
Broader (1)
Error detection and correction
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing
Bin Feng
,
Xinzhu Ma
,
Cheng Guo
,
Hui Shi
,
Zhangjie Fu
,
Tie Qiu
IEEE Access
2016
Corpus ID: 21954875
In cloud computing, data owners host their data on cloud servers, and users (data consumers) can access the data from the cloud…
Expand
2014
2014
Blind Medical Image Watermarking with LWT – SVD for Telemedicine Applications
N. Venkatram
,
L. Reddy
,
P. Kishore
2014
Corpus ID: 12150234
This paper highlights the extension of dwt-svd based image watermarking to medical images. In recent times internet has become a…
Expand
2013
2013
Enhanced Security Architecture for Cloud Data Security
C. Kant
,
Yogesh Sharma
2013
Corpus ID: 6865247
Cloud computing offers a prominent service for data storage known as cloud storage. The flow and storage of data on the cloud…
Expand
2012
2012
Iris-sensor authentication using camera PRNU fingerprints
A. Uhl
,
Y. Höller
International Conference on Biometrics
2012
Corpus ID: 31143827
Integrity and authenticity are important issues in biometrics security. Digital image forensics have shown that the integrity and…
Expand
2011
2011
Secure Stochastic ECG Signals Based on Gaussian Mixture Model for $e$-Healthcare Systems
Wei Wang
,
Honggang Wang
,
M. Hempel
,
Dongming Peng
,
H. Sharif
,
Hsiao-Hwa Chen
IEEE Systems Journal
2011
Corpus ID: 895059
The blood circulation system in a human body provides a unique and natural trust zone for secure data communications in wireless…
Expand
2011
2011
A New Watermarking Approach for Non-numeric Relational Database
R. Bedi
,
Anita M. Thengade
,
V. Wadhai
2011
Corpus ID: 16758752
ABSTRACT In this paper, a novel watermarking technique is proposed for data authentication and integrity of Relational Database…
Expand
2010
2010
Block Encryption Standard for Transfer of data
A. Kaushik
,
Anant Kumar
,
Manoj Barnela
International Conference on Networking and…
2010
Corpus ID: 12652570
In today's world, most of the means of secure data and code storage and distribution rely on using cryptographic schemes, such as…
Expand
2010
2010
Low-cost digital signature architecture suitable for radio frequency identification tags
Máire O’Neill
,
M. Robshaw
IET Computers & Digital Techniques
2010
Corpus ID: 5397229
Continuing achievements in hardware technology are bringing ubiquitous computing closer to reality. The notion of a connected…
Expand
2007
2007
A Secure MANET Routing Protocol with Resilience against Byzantine Behaviours of Malicious or Selfish Nodes
C. Crépeau
,
Carlton R. Davis
,
Muthucumaru Maheswaran
21st International Conference on Advanced…
2007
Corpus ID: 8012579
Secure routing in mobile ad hoc networks (MANETs) has emerged as a important MANET research area. MANETs, by virtue of the fact…
Expand
Highly Cited
1987
Highly Cited
1987
Message Authentication with Arbitration of Transmitter/Receiver Disputes
G. J. Simmons
International Conference on the Theory and…
1987
Corpus ID: 36233112
In the most general model of message authentication, there are four essential participants: a transmitter who observes an…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE