Bhatt et al., 2015 - Google Patents
E-authentication framework for secure e-governance servicesBhatt et al., 2015
View PDF- Document ID
- 6685539145623830906
- Author
- Bhatt R
- Kumar S
- Publication year
- Publication venue
- International Journal of Current Innovation Research
External Links
Snippet
The term Governance means activity of governing and controlling a country by its Government, controlling of an organization or a company by its cEO or Board of Directors or controlling of a house hold by the head of the house, Accordingly E Governance may also …
- 238000005516 engineering process 0 abstract description 11
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220222329A1 (en) | Systems and methods for securely processing a payment | |
US11562363B2 (en) | Hardware and token based user authentication | |
US10810290B2 (en) | Robust method and an apparatus for authenticating a client in non-face-to-face online interactions based on a combination of live biometrics, biographical data, blockchain transactions and signed digital certificates | |
Down et al. | Biometrics: An overview of the technology, challenges and control considerations | |
Zorkadis et al. | On biometrics‐based authentication and identification from a privacy‐protection perspective: Deriving privacy‐enhancing requirements | |
US20040158723A1 (en) | Methods for providing high-integrity enrollments into biometric authentication databases | |
US20160283944A1 (en) | Method and apparatus for personal virtual authentication and authorization using digital devices and as an alternative for chip card or smart card | |
CN109583888A (en) | A kind of certificate chain campus electronics card system | |
Sadhya et al. | A critical survey of the security and privacy aspects of the Aadhaar framework | |
Shoniregun et al. | Securing biometrics applications | |
Olaniyi et al. | A secure electronic voting system using multifactor authentication and blockchain technologies | |
CN112785410A (en) | Relying party risk adjustment indicator systems and methods | |
Alliance | Smart Cards and Biometrics | |
CN107735984A (en) | The method that shielded electronic communication, the safe transmission of information and processing are established between three or more main bodys | |
Bala | Biometrics and information security | |
Chao | Biometric-based personal identity-authentication system and security analysis | |
Kumar et al. | Examining the vulnerabilities of biometric systems: Privacy and security perspectives | |
Rodgers | Biometric and auditing issues addressed in a throughput model | |
Edu et al. | Exploring the risks and challenges of national electronic identity (NeID) system | |
Bhatt et al. | E-authentication framework for secure e-governance services | |
Barde | A multimodal biometric system-aadhar card | |
WO2013051010A2 (en) | A system and method for implementing biometric authentication for approving user's financial transactions | |
Sabater | Biometrics as password alternative | |
Goldstein et al. | Large-scale biometrics deployment in Europe: Identifying challenges and threats | |
Mills et al. | Cybercrimes against consumers: could biometric technology be the solution? |