Semantic Scholar uses AI to extract papers important to this topic.
The lack of a comprehensive European Union cross-border and cross-sector framework for secure, easy-to-use and authenticated… Expand The primary objective of this paper is to help institutions respond to the stipulation of the Higher Education Opportunity Act of… Expand With the absence of physical evidence, the concept of trust plays a crucial role in the proliferation and popularisation of… Expand This research work is based on introducing a very important aspect of e-electioneering into Nigerian voting system, without… Expand This is a Hard copy of the NIST Special Publication 800-63, Electronic Authentication Guideline. This recommendation provides… Expand We present an overview of quantum key distribution (QKD), a secure key exchange method based on the quantum laws of physics… Expand e-Government has become a global phenomenon. There have been some great innovations in e- government over the last decade. Some… Expand Electronic authentication and authorization aspects are one of burning issues tightly connected with information system security… Expand As federal agencies move toward more sophisticated e-govern- ment offerings, they must consider both policy and operational… Expand It is argued here, that the infrastructure required to include new technologies into school education requires complex inter… Expand