Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

basic authentication process level of assurance

National Institutes of Health

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Authenticating legitimate nodes is a major concern of the envisioned vehicular networks. To achieve this, standards and… Expand
Review
2015
Review
2015
Authentication refers to the process of ensuring confidentiality of data. It basically involves verifying a user's identity for… Expand
  • table 2
2012
2012
  • Y. An
  • 2012
  • Corpus ID: 54702540
Many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user… Expand
  • figure 1
  • figure 3
  • figure 5
  • table 1
2006
2006
A location-based information providing system and a method thereof are provided to prevent information from being recklessly… Expand
2006
2006
A method for paying money using human body-related information in commercial transaction systems is provided to process money… Expand
2003
2003
Value indicia are marks printed on paper that prove that a particular service has been paid for, one prevalent example being the… Expand
  • figure 1
  • figure 2
1997
1997
Cryptographic protocol design demands careful verification during all phases of development. Belief logics, in the tradition of… Expand
  • figure 1
  • figure 2