Pluggable authentication module

Known as: X/Open Single Sign-On, Pluggable Authentication Modules, PAM 
A pluggable authentication module (PAM) is a mechanism to integrate multiple low-level authentication schemes into a high-level application… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1996-2017
012319962017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
As broad adoption of Apache Hadoop [20] accelerates authentication and authorization capabilities are a major concern for data… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2014
2014
This paper has presented the different advanced modulation techniques for free space optical (FSO) communication systems… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2013
2013
As wireless communication systems become ever-more important and pervasive parts of our everyday life; system capacity and… (More)
Is this relevant?
2009
2009
In this paper, a 3.2Gb/s serial link transceiver, in a 0.35μm CMOS technology is presented. This serial link utilizes a new multi… (More)
  • figure 4
Is this relevant?
2006
2006
  • Marcel Haerry
  • 2006
Many (web) applications share content between several users and different views. To manage this content often a CMS (Content… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2005
2005
In Japan, many research networks are implemented with Internet Protocol Version 4 (IPv4) and Internet Protocol Version 6 (IPv6… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2003
2003
Authentication is one of the core security services of a distributed application platform. A variety of mechanisms to perform… (More)
Is this relevant?
1998
1998
To meet the challenge of integrating new methods and technologies into the Internet security framework, it is useful to hide low… (More)
  • table 2.1
  • table 2.2
  • figure 2.3
  • figure 2.4
  • figure 3.3
Is this relevant?
1997
1997
To meet the challenge of integrating new methods and technologies into the Internet security framework, it is useful to hide low… (More)
  • table 2.1
  • figure 2.3
  • figure 2.4
  • figure 3.2
  • figure 3.5
Is this relevant?
Highly Cited
1996
Highly Cited
1996
  • Vipin Samar
  • ACM Conference on Computer and Communications…
  • 1996
Since authentication mechanisms constantly evolve, it is important to shield the system-entry services and users from such… (More)
  • figure 1
  • table 2
  • figure 2
  • table 3
  • table 4
Is this relevant?