Skip to search formSkip to main contentSkip to account menu

User identifier

Known as: Userid, Real userid, Real user ID 
Unix-like operating systems identify a user within the kernel by a value called a user identifier, often abbreviated to user ID or UID. The UID… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Insider misuse has become a major risk for many organizations. One of the most common forms of misuses is data leakage. Such… 
2013
2013
Signcryption is a relatively new technique in public key cryptography, that perform both the functions of digital signature and… 
2009
2009
Biometric identification has lately attracted attention because of its high convenience; it does not require a user to enter a… 
2008
2008
— Secure electronic payment system is presented in this paper. This electronic payment system is to be secure for clients such as… 
2007
2007
Virtual environment secure file system (VSFS) is a software architecture for secure file sharing among applications with… 
2006
2006
  • E. Badinelli
  • 2006
  • Corpus ID: 34654638
The application relates to the systemic method for detecting unwanted ingredients, in food, beverage, and drug products, on a… 
Review
2004
Review
2004
: We apply some of the existing web server redundancy techniques for high service availability and scalability to the relatively… 
2002
2002
DHCP (dynamic host configuration protocol) makes it easy to access an IP network. However, since the DHCP itself does not have an… 
1997
1997
Network security is an integral component of a multi-user distributed information environment. Firewall (FW) technology is a… 
1996
1996
Seattle Smart Traveler (SST) is a world wide web (WWW) application designed to test the concept of dynamic rideshare matching…