Skip to search formSkip to main contentSkip to account menu

basic authentication process level of assurance

National Institutes of Health

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Authenticating legitimate nodes is a major concern of the envisioned vehicular networks. To achieve this, standards and… 
Review
2015
Review
2015
Authentication refers to the process of ensuring confidentiality of data. It basically involves verifying a user's identity for… 
2012
2012
应用业务的层次和域分,要求严格进行用户的规划和设计。应用业务对异域或分层用户的鉴别,存在着多种应用解决方案。根据不同类的应用业务,选择适应鉴别技术,科学的设计解决方案,合理部署系统。这是一个很值得深入研究的课题。本文概述应用系统中鉴别技术概况,介绍鉴别技术在实际应用系统中的选择和部署要点。谨以此供大家参考。 
2012
2012
  • Y. An
  • 2012
  • Corpus ID: 54702540
Many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user… 
2006
2006
A location-based information providing system and a method thereof are provided to prevent information from being recklessly… 
2006
2006
A method for paying money using human body-related information in commercial transaction systems is provided to process money… 
2003
2003
Value indicia are marks printed on paper that prove that a particular service has been paid for, one prevalent example being the… 
1997
1997
Cryptographic protocol design demands careful verification during all phases of development. Belief logics, in the tradition of…