Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,265,285 papers from all fields of science
Search
Sign In
Create Free Account
User identifier
Known as:
Userid
, Real userid
, Real user ID
Expand
Unix-like operating systems identify a user within the kernel by a value called a user identifier, often abbreviated to user ID or UID. The UID…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
16-bit
32-bit
Chmod
Data source name
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Insider Misuse Attribution using Biometrics
Abdulrahman Alruban
,
N. Clarke
,
Fudong Li
,
S. Furnell
ARES
2017
Corpus ID: 21168594
Insider misuse has become a major risk for many organizations. One of the most common forms of misuses is data leakage. Such…
Expand
2013
2013
Signcryption Scheme that Utilizes Elliptic Curve for both Encryption and Signature Generation
R. Ahirwal
,
Anjali Jain
,
Y. K. Jain
2013
Corpus ID: 16110688
Signcryption is a relatively new technique in public key cryptography, that perform both the functions of digital signature and…
Expand
2009
2009
Accuracy improvement with high convenience in biometric identification using multihypothesis sequential probability ratio test
Takao Murakami
,
Kenta Takahashi
International Workshop on Information Forensics…
2009
Corpus ID: 15023978
Biometric identification has lately attracted attention because of its high convenience; it does not require a user to enter a…
Expand
2008
2008
Design and Implementation of Secure Electronic Payment System (Client)
Pyae Pyae Hun
2008
Corpus ID: 18812743
— Secure electronic payment system is presented in this paper. This electronic payment system is to be secure for clients such as…
Expand
2007
2007
Security and Integrity of a Distributed File Storage in a Virtual Environment
G. Sala
,
D. Sgandurra
,
F. Baiardi
Fourth International IEEE Security in Storage…
2007
Corpus ID: 14897112
Virtual environment secure file system (VSFS) is a software architecture for secure file sharing among applications with…
Expand
2006
2006
Scanavert: detection and alarm against ingredient harm
E. Badinelli
CCNC . 3rd IEEE Consumer Communications and…
2006
Corpus ID: 34654638
The application relates to the systemic method for detecting unwanted ingredients, in food, beverage, and drug products, on a…
Expand
Review
2004
Review
2004
Failover and Load Sharing in SIP Telephony
Kundan Singh
,
H. Schulzrinne
2004
Corpus ID: 6306743
: We apply some of the existing web server redundancy techniques for high service availability and scalability to the relatively…
Expand
2002
2002
The secure DHCP system with user authentication
Tadashi Komori
,
Takamichi Saito
27th Annual IEEE Conference on Local Computer…
2002
Corpus ID: 12781935
DHCP (dynamic host configuration protocol) makes it easy to access an IP network. However, since the DHCP itself does not have an…
Expand
1997
1997
Firewall placement in a large network topology
Robert N. Smith
,
S. Bhattacharya
Proceedings of the Sixth IEEE Computer Society…
1997
Corpus ID: 33366603
Network security is an integral component of a multi-user distributed information environment. Firewall (FW) technology is a…
Expand
1996
1996
SEATTLE SMART TRAVELER
D. Dailey
,
D. Loseff
,
D. Meyers
,
M. Haselkorn
1996
Corpus ID: 5884587
Seattle Smart Traveler (SST) is a world wide web (WWW) application designed to test the concept of dynamic rideshare matching…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE