high authentication level of assurance

 
National Institutes of Health

Topic mentions per year

Topic mentions per year

2012-2016
01220122016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
In any of the computing environment ranging from a traditional computing to the emerging service based computing, security and… (More)
Is this relevant?
Review
2016
Review
2016
BLE (Bluetooth Low Energy) beacons are being deployed in smart cities, especially to augment the shopping experience of customers… (More)
  • figure 2
  • figure 1
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
Review
2014
Review
2014
  • Rajeshwari C. Choukimath, Vasudha V. Ayyannavar
  • 2014
The heterogeneous networks should support a broad range of multimedia services with guaranteed quality of service. In order to… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • table 1
Is this relevant?
2014
2014
Various kinds of authentication schemes have been deployed to secure the information or resources from unauthorized access. In… (More)
  • table I
  • table II
Is this relevant?
2013
2013
85 Abstract— In the recent years, cloud computing has emerged as one of the hottest and revolutionizing trends in the field of… (More)
  • figure 3
  • figure 4
Is this relevant?
2012
2012
  • Himika Parmar, Nancy Nainan
  • 2012
Phishing, a serious security threat to Internet users is an e-mail fraud in which the perpetrator sends out an email which looks… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2012
2012
The most common method used for authentication is Textual passwords. But textual passwords are in risk to eves dropping… (More)
  • figure 4
Is this relevant?