Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

high authentication process level of assurance

National Institutes of Health

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
& BUSINESSES ARE MOVING rapidly from centralized systems behind corporate firewalls to Software-as-a-Service (SaaS) vendors… Expand
2018
2018
In the era of Internet of Things (IoT) infrastructure, Secured information transfer is necessitated between mobile and internet… Expand
  • figure 1
  • figure 2
  • figure 6
  • figure 4
  • figure 5
2017
2017
A proper access control mechanism is the need of the hour, as the data stored in the cloud needs to be protected securely… Expand
  • figure 1
  • figure 2
2016
2016
Secure user authentication schemes in many e-Healthcare applications try to prevent unauthorized users from intruding the e… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Review
2015
Review
2015
Key distribution is the process of sharing the key between the parties who intend to communicate with each other such that any… Expand
2013
2013
Today, authentication technology is the main measure to guarantee information security, and the most common and convenient… Expand
  • figure 2.1
  • figure 2.2
  • figure 2.3
  • figure 2.4
  • figure 2.5
2012
2012
The invention discloses an electronic device extension board card detection method and an electronic device. The method includes… Expand
2009
2009
Data hiding (DH) is a technique used to embed a sequence of bits in a cover image with small visual deterioration and the means… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 6
  • figure 7
2006
2006
The invention is to solve issues: not security of transferring authentication cipher key through network by using plaintext; and… Expand
2005
2005
This paper defines a new ideal notion of strand spaces. The corresponding propositions and theorems are also extended so that… Expand