Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,890,170 papers from all fields of science
Search
Sign In
Create Free Account
Login
Known as:
Signing in
, Log in
, Logged in
Expand
In computer security, logging in, (or logging on or signing in or signing on), is the process by which an individual gains access to a computer…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Access control
Access token
Active Directory
Authentication
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Continuous user authentication using temporal information
Koichiro Niinuma
,
Anil K. Jain
Defense + Commercial Sensing
2010
Corpus ID: 393991
Conventional computer systems authenticate users only at the initial log-in session, which can be the cause of a critical…
Expand
Highly Cited
2008
Highly Cited
2008
History and Present Scope of Field Studies on Macaca fuscata yakui at Yakushima Island, Japan
J. Yamagiwa
International journal of primatology
2008
Corpus ID: 27141377
Field studies on Japanese macaques on Yakushima Island started in the mid-1970s, >25 yr after the emergence of Japanese…
Expand
Review
2007
Review
2007
The persistence and conservation of Borneo’s mammals in lowland rain forests managed for timber: observations, overviews and opportunities
Erik Meijaard
,
Douglas Sheil
,
Douglas Sheil
Ecological research
2007
Corpus ID: 10284340
Lowland rainforests on Borneo are being degraded and lost at an alarming rate. Studies on mammals report species responding in…
Expand
Review
2007
Review
2007
A Second Life for Your Museum: 3D Multi-User Virtual Environments and Museums
R. Urban
2007
Corpus ID: 60016010
The paper gives an overview of some of the museum-like activities currently being undertaken in Second Life. Current development…
Expand
Highly Cited
2006
Highly Cited
2006
A novel remote user authentication scheme using bilinear pairings
M. Das
,
A. Saxena
,
V. Gulati
,
D. B. Phatak
Computers & security
2006
Corpus ID: 14594801
Highly Cited
2004
Highly Cited
2004
A smart card-based remote scheme for password authentication in multi-server Internet services
Woei-Jiunn Tsaur
,
Chia-Chun Wu
,
Wei-Bin Lee
Comput. Stand. Interfaces
2004
Corpus ID: 5067660
Review
1999
Review
1999
Airline in-flight entertainment: the passengers’ perspective
F. Alamdari
1999
Corpus ID: 53141991
Highly Cited
1996
Highly Cited
1996
Audience and Voice in Current L1 Composition Texts: Some Implications for ESL Student Writers.
V. Ramanathan
,
R. Kaplan
1996
Corpus ID: 53142127
Review
1979
Review
1979
Local position of Fe 3+ in ferroelectric BaTiO 3
E. Siegel
,
K. Muller
1979
Corpus ID: 43526734
-The EPR spectra of Fe3+ in the three ferroelectric phases of BaTi03 could be interpreted on the basis of the Newman…
Expand
Review
1976
Review
1976
Hydrologic Changes After Logging in Two Small Oregon Coastal Watersheds
D. Harris
1976
Corpus ID: 140600287
Effects of clearcut, cable logging on the hydrologic characteristics of a small coastal stream in Oregon indicate an average 181…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE