Language:
English
US
China
Cart
0
Login/Create Portal Account
All Products
All Products
Books
Journals
Videos
Book Chapters
Journal Articles
Video Lessons
Teaching Cases
Special Offers
All IGI Global Scholarly Journals Shift to Open Access
Following the first conversion of a portion of IGI Global’s hybrid open access/subscription-based journals to gold open access (OA) in 2021, and then again in 2022, IGI Global is pleased to announce that the remainder of their hybrid open access/subscription-based journal collection will officially convert to gold OA beginning January 1st, 2023.
Learn More
IGI Global’s New Emerging Topic e-Book Collections
Acquire highly focused and affordable Cutting-Edge Peer-Reviewed Research Content through a selection of 17 topic-focused e-Book Collections discounted up to 90%, compared to list prices. Collection topics include Diversity, Equity, and Inclusion (DEI), Artificial Intelligence, Language Learning, Marketing and Customer Relations, Religious and Indigenous Studies, and more. Hosted on the InfoSci
®
platform, these collections feature no DRM, no additional cost for multi-user licensing, no embargo of content, full-text PDF & HTML format, and more.
Learn More
Open Access Book (Free Access) - New Models of Higher Education: Unbundled, Rebundled, Customized, and DIY (ISBN: 9781668438091)
The Walmart Corporation and the Lumina Foundation have provided funding to make the publication, New Models of Higher Education: Unbundled, Rebundled, Customized, and DIY (ISBN: 9781668438091), Fully Open Access, completely removing any paywall between researchers in education and the new models for the future of higher education.
Learn More
Open Access Book (Free Access) - Handbook of Research on the Global View of Open Access and Scholarly Communications (ISBN: 9781799898054)
Through a Collaboration between IGI Global and the University of North Texas, the Handbook of Research on the Global View of Open Access and Scholarly Communications (ISBN: 9781799898054) has been published as Fully Open Access, completely removing any paywall between researchers of any field, and the latest research on the equitable and inclusive nature of Open Access and all of its complications.
Learn More
Books
Books
Open Access Books
OnDemand Book Chapters
Books by Subject
Business, Administration, & Management
Education
Science, Technology, & Medical (STM)
Books by Field
Business & Management
Computer Science & Technology
Education
Environment & Agriculture
Government & Law
Library & Information Science
Media & Communications
Medicine & Healthcare
Science & Engineering
Security & Forensics
Social Sciences & Humanities
Journals
Journals
OnDemand Journal Articles
Journals by Subject
Business, Administration, & Management
Education
Science, Technology, & Medical (STM)
Journals by Field
Business & Management
Computer Science & Technology
Education
Environment & Agriculture
Government & Law
Library & Information Science
Media & Communications
Medicine & Healthcare
Science & Engineering
Security & Forensics
Social Sciences & Humanities
e-Collections
Open Access
Open Access Publishing
Open Access Journals
Open Access Books
Retrospective Open Access
Open Access Agreements
Publish
with Us
Resources
Librarians
e-Collections
Book Title List
Journal Title List
Video Title List
Library Collection Development Service
Browse Forthcoming Books
Consortia Partnerships
Library and Publisher Collaborations
Product Distributors
Catalogs
Open Access Initiative
Instructors
Course Adoption
Teaching Cases
K-12 Online Learning Collection
Researchers
Browse Books
Browse Journals
Browse Forthcoming Books
Search Open Access Content
OnDemand Downloads
Webinars
Authors and Editors
eEditorial Discovery
®
System
Peer Review Process
Ethics and Malpractice
COPE Membership
Fair Use Policy
Open Access Publishing
FAQ
Distributors
Distributor Resources
Book Distributors
Journal Subscription Agencies
E-Resource Partners
Browse Forthcoming Books
Catalogs
About Us
Newsroom
What is Authentication
1.
The verification of the identity of the source of information.
Learn more in: A Formal Verification Centred Development Process for Security Protocols
2.
Validating the identity of a subject. Proving that a subject is actually who they claim to be.
Learn more in: The Different Aspects of Information Security Education
3.
The process of determining whether or not a user is who they claim to be.
Learn more in: Pervasive Cyberinfrastructure for Personalized Education
4.
Act of verifying identity of an entity.
Learn more in: Towards Privacy Awareness in Future Internet Technologies
5.
Authentication
is to prove as genuine.
Learn more in: Identity Management for Wireless Service Access
6.
The process of ensuring that an individual is one who he or she claims to be.
Learn more in: Agent-Facilitated Virtual Marketplace for Airline Ticketing
7.
Is used by a client to verify that the server is what it purports to be.
Learn more in: Introduction to Quantum-Resistant Blockchain
8.
A process in which the credentials provided are compared to those on file in a database of authorized users’ information on a local operating system or within an
authentication
server. If the credentials match, the process is completed, and the user is granted authorization for access. The permissions and folders returned define both the environment the user sees and the way he can interact with it, including hours of access and other rights such as the amount of allocated storage space.
Learn more in: Real-Time ECG-Based Biometric Authentication System
9.
Authentication
is required to make sure communicating parties are the ones who they claim to be.
Learn more in: Security Measures for Mobile Ad-Hoc Networks (MANETs)
10.
The act of proving or verifying that, for example, a system is who it says it is.
Learn more in: A Survey on Attacks and Defences on LoRaWAN Gateways
11.
Verifying the identity of the user. There are three main approaches to user
authentication
: knowledge-based, possession-based and biometrics-based.
Learn more in: Authentication Practices from Passwords to Biometrics
12.
Verification of the identity of a user or network node who claims to be legitimate.
Learn more in: Evaluation of Security Architectures for Mobile Broadband Access
13.
Security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual’s authorization to receive specific categories of information (Harris, 2002 AU11: The in-text citation "Harris, 2002" is not in the reference list. Please correct the citation, add the reference to the list, or delete the citation. ).
Learn more in: Argument for Improved Security in Local Governments Within the Economic Community of West African States
14.
Procedure that verifies the digital identity of participants in communication. It guaranties that the users are exactly who they say they are.
Learn more in: Internet and E-Business Security
15.
The process of ensuring that an individual is one who he or she claims to be.
Learn more in: A Virtual Community for Mobile Agents
16.
Authentication
means that a user who is requesting services is a valid user of the network services requested.
Learn more in: Telecommunication Management Protocols
17.
Proof of identity.
Learn more in: Security Aspects in Radio Frequency Identification Networks
18.
Provides transaction quality of being authoritative, valid, true, genuine, and worthy of acceptance or belief by reason of conformity to the fact that reality is present in Web services.
Learn more in: A Case Study in the Role of Trust in Web Service Securities
19.
In the context of this chapter,
authentication
refers to the process of establishing that a usually remote entity is who or what they claim to be (cf. (Chokhani, S., et al, 2003), section 2.)
Authentication
of an entity to a verifier usually involves the presentation of an identity token, along with a verification by the verifier of the validity of the token, as well as a check that the entity is the one named in the token. A real-life example is presenting a passport to an immigration official, who will check that it is a valid passport and compare the picture with the person presenting the passport. Cf. identification, below.
Learn more in: Security and Trust in a Global Research Infrastructure
20.
The process of ensuring that the individual is who he or she claims to be, and says nothing about the access rights of the individual.
Learn more in: Biometric Authentication for Cloud Computing
21.
A set of procedures for identifying individuals or groups and check their data or system access rights.
Learn more in: Cybersecurity of Industrial Internet of Things
22.
The process of verifying that a person or resource accessing your system is actually how they claim to be.
Learn more in: Guarding Corporate Data from Social Engineering Attacks
23.
The process of ensuring that an individual is who he or she claims to be.
Learn more in: Mobile Agent Authentication and Authorization
24.
Security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual's authorization to receive specific categories of information (Harris, 2002 AU28: The in-text citation "Harris, 2002" is not in the reference list. Please correct the citation, add the reference to the list, or delete the citation. ).
Learn more in: Understanding the Methods behind Cyber Terrorism
25.
The act of proving identity of a computer system user. Actually, this is a process of verifying that user (person, computer etc.) is what it claims to be. This process can be based on something the user knows (password, personal identification number – PIN, etc.), something the user has (ID card, security token, etc.) or something the user is (fingerprint, retinal pattern, signature, voice, face, etc).
Learn more in: Application of Cloud Computing in Electric Power Utility Systems: Advantages and Risks
26.
It is the process where an entity must prove digitally that it is the entity that it claims to be.
Learn more in: Digital Identity in Current Networks
27.
The procedure of determining whether someone or something is who or what they declare to be. In small business networks
authentication
is commonly done through the use of passwords and digital certificates (Butcher-Powell, 2005).
Learn more in: Status and Future Trends of Multimedia Interactivity on the Web
28.
A method of proving someone’s identity, especially if that someone is an authorized user of processes or resources.
Learn more in: Secure Routing with Reputation in MANET
29.
The acceptance or the rejection of the identity given by a person.
Learn more in: Exploring New Handwriting Parameters for Writer Identification
30.
The process of verifying the identity alleged by a user that tries to gain access to a system.
Learn more in: Behavioral Based Technologies for Enhancement of Login/Password Systems
31.
The verifying of identity or information.
Learn more in: Staying Legal and Ethical in Global E-Learning Course and Training Developments: An Exploration
32.
Authentication
is the service of assuring the identity of a person or device. It assures the recipient that the message or data it receives is from the source it claims to be.
Learn more in: Implementing Information Security Using Multimodal Biometrics
33.
It is the process to identify if the claim made is valid or not.
Learn more in: Artificial Intelligence-Based Behavioral Biometrics
34.
An option providing a way of identifying a user, typically by having the user enter a valid user-name and valid password before access is granted. The process of
authentication
is based on each user having a unique set of criteria for gaining access.
Learn more in: Developing Content Delivery Networks
35.
The process of ensuring that an individual is who he or she claims to be.
Learn more in: Mobile Agent Authentication and Authorization in E-Commerce
36.
Establishes the users as who they claim they are.
Learn more in: Knowledge Management and Information Technology Security Services
37.
Is the process of verifying a claim of identity. Three different types of information can be used for
authentication
: something you know (a PIN, a password, mother's maiden name), something you have (magnetic swipe card) or something you are (biometrics).
Learn more in: Designing an Effective Information Security Policy for Public Organizations: ISO 27001 as a Success Framework
38.
A way to confirm the truth of any attribute associated with any data or information that has been claimed as true by an entity.
Learn more in: Security in Ad Hoc Network and Computing Paradigms
39.
The action of verifying information such as identity, ownership, or authorization.
Learn more in: Biometrics
40.
Proof of identity.
Learn more in: Mobile Payment
41.
Security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual's authorization to receive specific categories of information.
Learn more in: Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
42.
Verifying user’s assertion of its identification through credentials.
Learn more in: How Private Is Your Financial Data?: Survey of Authentication Methods in Web and Mobile Banking
43.
The process of verifying a claim of identity. Three different types of information can be used for
authentication
: something you know (a PIN, a password, mother's maiden name), something you have (magnetic swipe card) or something you are (biometrics).
Learn more in: Information Security Policy in Large Public Organizations: A Case Study Through ISO 27002
44.
The process of recognizing a user's identity.
Learn more in: Applications of Keystroke Dynamics Biometrics in Online Learning Environments: A Selective Study
45.
It refers to any mechanisms by which a system allows or denials the access to the data and keep them stored at cloud sites that accessible only by users who own the data.
Learn more in: A New Approach in Cloud Computing User Authentication
46.
Authentication
is the action of confirming that a user who is requesting services is a valid user of the network services requested.
Learn more in: Authentication, Authorization, and Accounting (AAA) Framework in Network Mobility (NEMO) Environments
47.
The process through which an Internet merchant can be established via a trusted third party that guarantees that the merchant is indeed whom he is.
Learn more in: Security Policy Issues in Internet Banking in Malaysia
48.
Authentication
is the decision process where a biometric is sampled from a person with an identity claim and the sampled biometric is compared to a biometric template stored previously for this person to validate the identity claim.
Learn more in: Machine Learning for Biometrics
49.
Establishing or confirming something (or someone) as authentic , that is, that claims made by or about the subject are true.
Learn more in: Extending the Scope of eID Technology: Threats and Opportunities in a Commercial Setting
50.
Any process by which a system verifies the identity of a User who wishes to access it. Since Access Control is normally based on the identity of the User who requests access to a resource.
Learn more in: Authentication Model for Enterprise Resource Planning Network
51.
Authentication
is the act of establishing or confirming something (or someone) as authentic, that is, that claims made by or about the thing are true.
Learn more in: Spatial Authentication Using Cell Phones
52.
It is the process of verifying the identity alleged by a user who tries to gain access to a system.
Learn more in: Keystroke Dynamics and Graphical Authentication Systems
53.
To ensure that the users are they who are claimed to be. It identifies and assures the origin of information.
Learn more in: A Comparative Study on DNA-Based Cryptosystem
54.
Authentication
is the process of identifying an individual, usually based on a user name and password. In security systems,
authentication
is distinct from authorization, which is the process of giving individuals access to system objects based on their identity.
Authentication
merely ensures that the individual is who he or she claims to be, but says nothing about the access rights of the individual.
Learn more in: Implementing a Sound Public Information Security Program
55.
Verifying and confirming the identity of a grid user.
Learn more in: SHARE: A European Healthgrid Roadmap
56.
Represents the process of identifying a user within a computer system, software, or web application.
Learn more in: CSAP: Cyber Security Asynchronous Programming With C++20 and C# 8 for Internet of Things and Embedded Software Systems
57.
The mechanism of checking the originality of a digital content. An alteration made into the digital media is treated as the violation of authenticity.
Learn more in: Genetic-Algorithm-Based Optimization of Fragile Watermarking in Discrete Hartley Transform Domain
58.
Validating the identity of a user requiring access to a resource, often achieved in the grid community through the public key infrastructure.
Learn more in: Grid Computing for Social Science
59.
This process involves the validation of the user’s identity before granting network access. The unique characteristics attributed to the user such as their biometric data like iris scans or fingerprints or secret key parsed by the IAAA server and compared to user associated information in the database.
Learn more in: Self-Analysis Technology, Roles, and Cybersecurity in the Virtual Learning Environments
60.
Confirmation of a claim of identity e-
Authentication
:
Authentication
carried out electronically
Learn more in: Trends in Government e-Authentication: Policy and Practice
61.
The act of ensuring that an object or entity is what it is intended to be.
Learn more in: Virtual Private Networks
62.
A process of identifying secure users in a network.
Learn more in: Development of a University Networking Project
63.
A method to verify and ensure that users are who they say they are – that the user who attempts to get access to networks or functions is in fact the user who is authorized to do so.
Learn more in: Ubiquitous Communication Via Residential Gateways
64.
Authentication
is the property that something (
authentication
of data) or someone (
authentication
of entity) can prove what or who it is declared to be.
Learn more in: Secure Techniques for Remote Reconfiguration of Wireless Embedded Systems
65.
Authentication
is the corroboration of a claimed set of attributes or facts with a specified, or understood, level of confidence.
Learn more in: An Interoperable Cross-Context Architecture to Manage Distributed Personal E-Health Information
66.
It is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity. It is a process in which the credentials (e.g. username and password) provided are compared to those in a database of authorized users' information on a local operating system or within an
authentication
server. If the credentials match, the process is completed and the user is granted authorization for access.
Learn more in: Application of Face Recognition Techniques in Video for Biometric Security: A Review of Basic Methods and Emerging Trends
67.
The service used to establish the identity of one device as a member of the set of devices authorized to communicate securely to other devices in the set.
Learn more in: Comparing ZigBee, Bluetooth, UWB, and Wi-Fi
68.
is the function of specifying access rights to resources related to information security and computer security in general and to access control in particular.
Learn more in: Security Issues in Cloud Computing
69.
Specifies whether user or a node is genuine or not.
Learn more in: Security Challenges in Fog Computing
70.
Authentication
is a security goal and refers to the verification of a real or digital identity of a person, an electronic node, or device. In the context of protocols, this refers to the verification of a message sender’s or protocol participant’s identity.
Learn more in: Formal Analysis and Design of Authentication Protocols
71.
In computing the procedure or activity of confirming the identity of a client or process.
Learn more in: IoT Security: To Secure IoT Devices With Two-Factor Authentication by Using a Secure Protocol
72.
It is the process of recognizing a user’s identity which verifying the identity of user or information.
Learn more in: IoT-Enabled 5G Networks for Secure Communication
73.
The processes of verifying the identity of an entity if it is indeed the entity it declares to be.
Learn more in: Security in Mobile Ad Hoc Networks
74.
Security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual’s authorization to receive specific categories of information.
Learn more in: Biometric Authentication
75.
It is a process of verifying a user’s identity. In simple mechanism, this involves using a username and password to prove one identity. In complex system, certificates, images can be used to prove one's identity.
Learn more in: Security for Cross-Tenant Access Control in Cloud Computing
76.
Authentication
is the attempt to verify the digital identity of the sender of an
authentication
request.
Learn more in: Generic Application Security in Current and Future Networks
77.
Verifying the identity of the user. There are three main approaches to user
authentication
: knowledge-based, possession-based, and biometric-based.
Learn more in: Authentication Methods for Computer Systems Security
78.
This is the act of establishing or confirming something is authentic or true.
Learn more in: Mobility for Secure Multi-Factor "Out of Band" Authentication
79.
Verifying user’s assertion of its identification through credentials.
Learn more in: Identity Management Systems: Models, Standards, and COTS Offerings
80.
The process of determining whether someone or something, is who or what it declares itself to be.
Learn more in: Research Information Management Systems: A Comparative Study
81.
The act of confirming the truth of an attribute of a single piece of data (datum) or entity.
Learn more in: Access Control Framework for Cloud Computing
82.
Security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual’s authorization to receive specific categories of information.
Learn more in: Teletranslation
83.
A process for knowing if someone who he is declared to be.
Learn more in: Security of Internet-, Intranet-, and Computer-Based Examinations in Terms of Technical, Authentication, and Environmental, Where Are We?
84.
Authentication
aims to test and ensure, with a certain probability, that particular data are authentic, i.e., they have not been changed.
Learn more in: Big Data Security: Challenges, Recommendations and Solutions
85.
It is a method to identify cardholder and merchant before payment.
Authentication
is the mechanism in which the system will identify the cardholder or merchant, “Is that really you?”
Learn more in: Road Map to Information Security Management
86.
refers to verifying the identity of a particular user.
Learn more in: Security of Identity-Based Encryption Algorithms
87.
Authentication
is the process by which an entity provides its identity to another party, for example, by showing photo ID to a bank teller or entering a password on a computer system.
Learn more in: Identity Management
88.
A security procedure designed to verify that the authorization code entered by a user to gain access to a network or system is valid.
Learn more in: Organizational Password Policy
89.
The act of establishing or confirming something or someone as authentic. In the security domain this might for example involve electronically confirming the identity of a person wishing to access a given software or hardware resource.
Authentication
can be achieved in many ways, e.g. usernames/passwords, certificate based systems etc.
Learn more in: e-Infrastructures Fostering Multi-Center Collaborative Research into the Intensive Care Management of Patients with Brain Injury
90.
Proving that a party is who he/she claims to be.
Learn more in: Security and Privacy in Distance Education
91.
Verification of the identity of a user or network node who claims to be legitimate.
Learn more in: Secure Routing and Mobility in Future IP Networks
92.
The process by which a system can provably verify the identity of a resource such as an individual, a system, an application, and so forth.
Learn more in: An Overview of Privilege Management Infrastructure (PMI)
93.
Authentication
is the method and procedure to identify the users who try to get into the network. The
authentication
procedure can include physical and software based identification means and nowadays is strictly based on the protocols that define all details. Encryption: Encryption is a method to hide the clear text of the user data from misuse. There are several methods of encoding the original text and nowadays the method of encrypting is dynamically changed all the time during the transmission.
Learn more in: Modelling Wireless Local Area Networking in Higher Education Institutes
94.
Is a process of proving the identity of a previously registered end user.
Learn more in: Digital Identity Management in Cloud
95.
It is the situation in which it can be verified that a document has been prepared or that it belongs to whom the document claims to belong.
Authentication
occurs when the user can provide some way to verify that said person is who he claims to be; from that moment he is considered an authorized user.
Learn more in: Social Research Methods in Cybersecurity: From Criminology to Industrial Cybersecurity
96.
The process or action of verifying the identity of a user or process, e.g. verification based on username and password credentials.
Learn more in: Internet of Things Application for Intelligent Cities: Security Risk Assessment Challenges
97.
Authentication
is the process of attempting to verify the digital identity of the sender of a communication such as a request to log in. The sender being authenticated may be a person using a computer, a computer itself, or a computer program.
Learn more in: Trustworthy Networks, Authentication, Privacy, and Security Models
98.
It’s the process of verifying the identity alleged by a user that tries to gain access to a system.
Learn more in: Using Technology to Overcome the Password's Contradiction
99.
The process of determining whether someone or something is, in fact, who or what it is declared to be before accessing or using a computer system.
Learn more in: Security Challenges for Cloud Computing Development Framework in Saudi Arabia
100.
Permission to access something, which is confidential. The
authentication
is only provided to authentic users.
Learn more in: An IBE-Based Authenticated Key Transfer Protocol on Elliptic Curves
101.
The process of verifying that someone is who he/she claims to be.
Learn more in: Security Issues of Smartphones Regarding M-Commerce
102.
Is needed in order to be sure about the identity of the sender or receiver of a message. The attack is called masquerading, that is pretending to be somebody else.
Learn more in: Emerging Security Issues in VANETS for E-Business
103.
Process of checking the identity of a person or a device.
Learn more in: Threats and Vulnerabilities of Mobile Applications
104.
The act of establishing or confirming that someone or something is authentic, that claims made by or about the subject are true.
Learn more in: Fundamental Building Blocks for Security Interoperability in e-Business
105.
A process for verifying the digital identity of users or processes.
Learn more in: Privacy-Enhancing Technologies
106.
Protection measures and methods of insuring only authorized entities access information. This is linked to concepts such as need-to-know.
Authentication
suggests control of communication channels and access to information internally and externally as a security service.
Learn more in: Information Assurance and Security Curriculum Meeting the SIGITE Guidelines
Find more terms and definitions using our
Dictionary Search
.
Authentication
appears in:
Handbook of Research on Information Security and...
Search inside this book for more research materials.
Recommend to a Librarian
Recommend to a Colleague
Looking for research materials? Search our database for more
Authentication
downloadable research papers.
InfoSci-OnDemand
Download Premium Research Papers
Full text search our database of 176,600 titles for
Authentication
to find related research papers.
Learn More About Authentication in These Related Titles
Bilingual Special Education for the 21st Cen...
Education
Copyright 2022. 379 pages.
Bilingual students with disabilities have an estab...
In Stock
$29.50 Individual Chapters
Handbook of Research on Clinical Application...
Medicine & Healthcare
Copyright 2020. 1356 pages.
In the past, individuals in the dentistry field ha...
In Stock
$29.50 Individual Chapters
Theory and Practice of Business Intelligence...
Medicine & Healthcare
Copyright 2020. 322 pages.
Business intelligence supports managers in enterpr...
In Stock
$29.50 Individual Chapters
Handbook of Research on the Global Impacts a...
Media & Communications
Copyright 2020. 539 pages.
The world is witnessing a media revolution similar...
In Stock
$29.50 Individual Chapters
Handbook of Research on Competency-Based Edu...
Education
Copyright 2017. 454 pages.
The majority of adult learners are looking to atta...
In Stock
$29.50 Individual Chapters
Censorship and Student Communication in Onli...
Education
Copyright 2016. 622 pages.
While freedom of speech is a defining characterist...
In Stock
$29.50 Individual Chapters
Handbook of Research on Computerized Occlusa...
Medicine & Healthcare
Copyright 2015. 973 pages.
Modern medicine is changing drastically as new tec...
In Stock
$29.50 Individual Chapters
Educational, Psychological, and Behavioral C...
Media & Communications
Copyright 2014. 465 pages.
Online communities continue to evolve as more peop...
In Stock
$29.50 Individual Chapters
Integrated Operations in the Oil and Gas Ind...
Business & Management
Copyright 2013. 457 pages.
The predicted “ICT revolution” has gained increasi...
In Stock
$29.50 Individual Chapters
Electronic Enterprise: Strategy and Architec...
Business & Management
Copyright 2003. 384 pages.
Enterprise evolution (or electronic enterprise) is...
In Stock
$29.50 Individual Chapters