Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

basic authentication process level of assurance

 
National Institutes of Health

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Authenticating legitimate nodes is a major concern of the envisioned vehicular networks. To achieve this, standards and… Expand
Is this relevant?
Review
2015
Review
2015
Authentication refers to the process of ensuring confidentiality of data. It basically involves verifying a user's identity for… Expand
  • table 2
Is this relevant?
2012
2012
Many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user… Expand
  • figure 1
  • figure 3
  • figure 5
  • table 1
Is this relevant?
2006
2006
A location-based information providing system and a method thereof are provided to prevent information from being recklessly… Expand
Is this relevant?
2006
2006
A method for paying money using human body-related information in commercial transaction systems is provided to process money… Expand
Is this relevant?
2003
2003
Value indicia are marks printed on paper that prove that a particular service has been paid for, one prevalent example being the… Expand
  • figure 1
  • figure 2
Is this relevant?
1997
1997
Cryptographic protocol design demands careful verification during all phases of development. Belief logics, in the tradition of… Expand
  • figure 1
  • figure 2
Is this relevant?