Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Electronic authentication

Known as: E-Authentication, Electronic authentication (E-authentication) 
Electronic authentication, also referred to as e-authentication is the process of establishing confidence in user identities electronically presented… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
The lack of a comprehensive European Union cross-border and cross-sector framework for secure, easy-to-use and authenticated… Expand
2017
2017
The primary objective of this paper is to help institutions respond to the stipulation of the Higher Education Opportunity Act of… Expand
  • table 1
  • table 2
2015
2015
With the absence of physical evidence, the concept of trust plays a crucial role in the proliferation and popularisation of… Expand
  • figure 1
  • figure 2
2014
2014
This research work is based on introducing a very important aspect of e-electioneering into Nigerian voting system, without… Expand
  • figure 1
  • figure 2
Highly Cited
2012
Highly Cited
2012
This is a Hard copy of the NIST Special Publication 800-63, Electronic Authentication Guideline. This recommendation provides… Expand
Review
2010
Review
2010
We present an overview of quantum key distribution (QKD), a secure key exchange method based on the quantum laws of physics… Expand
  • figure 1
  • figure 2
Review
2009
Review
2009
e-Government has become a global phenomenon. There have been some great innovations in e- government over the last decade. Some… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
2008
2008
Electronic authentication and authorization aspects are one of burning issues tightly connected with information system security… Expand
  • table I
Review
2005
Review
2005
As federal agencies move toward more sophisticated e-govern- ment offerings, they must consider both policy and operational… Expand
2005
2005
It is argued here, that the infrastructure required to include new technologies into school education requires complex inter… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4