authentication

Definitions

  • WordNet 3.6
    • n authentication validating the authenticity of something or someone
    • n authentication a mark on an article of trade to indicate its origin and authenticity
    • ***
Century Dictionary and Cyclopedia
  • Interesting fact: In an authentic Chinese meal, the last course is soup because it allows the roast duck entree to "swim" toward digestion.
    • n authentication The act of authenticating, verifying, or establishing the authoritativeness, genuineness, validity, credibility, or truth of anything; specifically, in law, the official attestation of a written instrument.
    • ***
Chambers's Twentieth Century Dictionary
  • Interesting fact: Identify a fake: The second hand on an authentic Rolex watch doesn't tick, it moves smoothly.
    • ns Authentication act of authenticating: confirmation
    • ***

Quotations

  • Walter Gropius
    Walter Gropius
    “A modern, harmonic and lively architecture is the visible sign of an authentic democracy.”
  • Barbara De Angelis
    Barbara%20De%20Angelis
    “We need to find the courage to say NO to the things and people that are not serving us if we want to rediscover ourselves and live our lives with authenticity.”
  • Daniel J. Boorstin
    Daniel%20J.%20Boorstin
    “The world of crime is a last refuge of the authentic, uncorrupted, spontaneous event.”
  • Rebecca West
    Rebecca%20West
    “Any authentic work of art must start an argument between the artist and his audience.”
  • Albert Camus
    Albert%20Camus
    “Without culture, and the relative freedom it implies, society, even when perfect, is but a jungle. This is why any authentic creation is a gift to the future.”
  • Source Unknown
    Source Unknown
    “Achievement is not the most important thing -- Authenticity is”

Usage

In literature:

Vasari had to enliven his biographies by anecdotes, and their authenticity was not always without reproach.
"Donatello" by David Lindsay, Earl of Crawford
By this means the powers were fully authenticated; but the letter remained safe in Mr. Macleane's hands.
"The Works of the Right Honourable Edmund Burke, Vol. VIII. (of 12)" by Edmund Burke
That trial, therefore, furnishes the largest body of authentic precedents in this point to be found in the records of Parliament.
"The Works of the Right Honourable Edmund Burke, Vol. XI. (of 12)" by Edmund Burke
It'll sound more authentic that way.
"Operation: Outer Space" by William Fitzgerald Jenkins
But the copies of them at the Hague are regarded as authentic, and the convincing passages are underlined in red ink.
"Historical Mysteries" by Andrew Lang
The Colleoni, or Coglioni, family were of considerable antiquity and well-authenticated nobility in the town of Bergamo.
"Sketches and Studies in Italy and Greece, Complete" by John Symonds
In this sense all the ancient and authentic myths concerning him are plain and full of meaning.
"The Myths of the New World" by Daniel G. Brinton
These accounts, not being authentic, are not of sufficient weight to be relied on.
"History of Rationalism Embracing a Survey of the Present State of Protestant Theology" by John F. Hurst
Compiled from Authentic Sources.
"The Atlantic Monthly, Volume 13, No. 80, June, 1864" by Various
There is an authentic story told of Tintoretto in his age, which is in touching contrast to what is otherwise known of the man.
"The Old Masters and Their Pictures" by Sarah Tytler
Of talking horses there was no authenticated case.
"Bakemono Yashiki (The Haunted House)" by James S. De Benneville
First authentic use of organs, 755; in England, 951.
"The Handy Cyclopedia of Things Worth Knowing" by Joseph Triemens
The earliest authentic evidence of Christians in England is mentioned by Tertullian, in 208.
"Cathedral Cities of England" by George Gilbert
He'd become, overnight, an authentic Japanese legend.
"The Samurai Strategy" by Thomas Hoover
Not a sentence that fell from his lips has been authentically recorded.
"Ephemera Critica" by John Churton Collins
One authentic specimen (KU 31944), southeastern Kansas, between 1885 and 1910, Alexander J. C. Roese.
"Check-list of the Birds of Kansas" by Harrison B Tordoff
This was a period when the marvellous never weakened the authenticity of a tale.
"Amenities of Literature" by Isaac Disraeli
But neither Grote, nor E. Curtius, nor even Sir George Cox, has analysed the evidence for the authenticity of the older portion of this register.
"Problems in Greek history" by John Pentland Mahaffy
We have a number of well authenticated stories to illustrate this.
"Psychotherapy" by James J. Walsh
According to authentic documents the numbers of the nobility and tradespeople do not exceed 3,000,000.
"Travels in the Steppes of the Caspian Sea, the Crimea, the Caucasus, &c." by Xavier Hommaire de Hell
***

In poetry:

The grand, authentic songs that roll
Across grey widths of wild-faced sea,
The lordly anthems of the Pole,
Are loud upon the lea.
"In Memoriam~ -- Alice Fane Gunn Stenhouse" by Henry Kendall
Stained with oil,
In authentic caps,
True-to-life in their perfectly plausible jobs,
They enter and exit with speeches
That unfurl like carpets under their feet.
"Actors" by Marin Sorescu
Is so far clear? You know Violante now,
Compute her capability of crime
By this authentic instance? Black hard cold
Crime like a stone you kick up with your foot
I’ the middle of a field?
"The Ring And The Book - Chapter IV - Tertium Quid" by Robert Browning
'Tis fittest thus! for though with skill
He sang of beck and tarn and ghyll,
The deep, authentic mountain-thrill
Ne'er shook his page!
Somewhat of worldling mingled still
With bard and sage.
"In Laleham Churchyard" by William Watson
Nor less the satiate year impends
When, wearying of routine-resorts,
The pleasure-hunter shall break loose,
Ned, for our Pantheistic ports:--
Marquesas and glenned isles that be
Authentic Edens in a Pagan sea.
"To Ned" by Herman Melville

In news:

Mid-Week Menu: Local 123 Goes Mobile, Authentic Bagel Company, and Blue Bottle's Beehives.
Giving up this endangered fish could promote authentic – and tastier – sushi.
Rotation with Augstine B. Lawrence and KJHK proudly hosted this authentic hip hop crew Friday, Nov 4th, and got them up in the studio, live on-air.
When Cuba Libre co-owner/chef Guillermo Pernot held his Pop-Up Paladar on Tuesday he didn't just forge a tasty authentic meal of olive-raising paste, crab-meat-stuffed corn-pasta cannelloni and picked cod-n-lamb tongue.
Here is an all-around family dining pleasure: authentic New Mexican food provided by Boxcar Cantina.
An authentic from-scratch bakery, with breakfast, lunch, and extensive dinners.
BROOKSIDE — A historic north Jefferson church is celebrating its roots this weekend by offering up authentic Russian food.
Recent footage of a smeary Sasquatch in Provo, Utah has stirred the usual cauldron of inquisitiveness regarding authenticity.
New research claims to show authenticity.
Pope Benedict says Shroud of Turin authentic burial robe of Jesus.
It's easy to be distracted with this Mexican eatery's expansive, authentic menu (and enticing cocktail list) but don't miss out on their nachos, which come six different ways.
In order to make this seem so much more authentic, I sat down with a notebook, and a pen.
In his fifth year as the head research and development chef for Taco Cabana 's 156 outlets, Waters works to bring authentic Mexican food to the chain's kitchens to keep it in touch with its roots.
Taco Cabana 's Corn Street Tacos ($4.79 for three, available for a limited time) are part of the chain's latest efforts to convey flavors that are authentically Mexican.
La Fogata serves fresh, authentic Mexican.
***

In science:

By relating this process to the requirements of some popular RFID authentication protocols, we assess the (im)practicality of utilizing memory based randomness techniques on resource constrained devices.
We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags (RFIDSec 2009)
This function is a variant of the NH hash function that was designed to be efficient in software in order to accelerate the UMAC message authentication algorithm .
We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags (RFIDSec 2009)
One of the most important RFID security challenges is tag authentication.
We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags (RFIDSec 2009)
HB+ is a challenge-response scheme based on the HB human authentication protocol that is designed with the computational and memory constraints of RFID tags in mind, requiring only bitwise logic operators for computation.
We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags (RFIDSec 2009)
This assumes that no other RAM space is occupied by the authentication protocol itself, which is unlikely to be true in practice.
We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags (RFIDSec 2009)
Instead of a user presenting his or her tag to a reader once, leaving it present momentarily, and returning the tag to a pocket or other storage, users would have to repeatedly bring the access card within the range of the reader and back out again, introducing a high user burden into the authentication process.
We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags (RFIDSec 2009)
This would make the values generated extremely predictable, undermining the security of any authentication scheme or cryptographic protocol built on top of the random number generator.
We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags (RFIDSec 2009)
On its own, however, this method seems unlikely to be able to handle the randomness requirements of current RFID authentication protocols such as HB+, HB#, and related variants.
We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags (RFIDSec 2009)
HB++: a Lightweight Authentication Protocol SeIn Security, Privacy and Trust in Pervasive and Ubiquitous cure against Some Attacks.
We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags (RFIDSec 2009)
Authenticating Pervasive Devices with Human Protocols.
We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags (RFIDSec 2009)
The produced information to be useful, a worker as the producer strives for accuracy, objectivity, authenticity and display of rationality of thought (Schultze 2000) in the product.
On challenges and opportunities of designing integrated IT platforms for supporting knowledge works in organizations
Authentication is the act of establishing that the claims made by a user are true which includes conforming the identity and origin of the user for security purpose .
Software Security Rules, SDLC Perspective
A wide variety of techniques are present to provide authentication which may include use of passwords, biometric techniques, smart cards, certificates, etc .
Software Security Rules, SDLC Perspective
By implementing the process of authorization, it can be determined whether an identity is permitted to perform specified action or not . The process of authorization can only be performed after the process of authentication has successfully accomplished . 13.
Software Security Rules, SDLC Perspective
One may consider the following modification, which is easier to apply, but lacks the authentic idea to allow for schemes which use more observations near each current time n.
Random walks - a sequential approach
***