Results 11 to 20 of about 599,267 (255)

On the security of digital signature schemes based on error-correcting codes [PDF]

open access: yes, 2003
We discuss the security of digital signature schemes based on error-correcting codes. Several attacks to the Xinmei scheme are surveyed, and some reasons given to explain why the Xinmei scheme failed, such as the linearity of the signature and the ...
Doumen, Jeroen   +2 more
core   +9 more sources

REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs [PDF]

open access: yes, 2020
Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency.
Al-Zubaidie, Mishall   +2 more
core   +2 more sources

Digital multi-signature scheme based on bilinear pairing

open access: yes网络与信息安全学报, 2016
Based on bilinear pairing and three complicated problems,a new digital multi-signature scheme was pro-posed.In the new scheme,the advantage of fast signature in broadcasting digital multi-signature was applied to se-quential digital multi-signature.By ...
Cai-juan ZHANG, Lin YOU
doaj   +3 more sources

Research and Application of Cloud Digital Signature Technology [PDF]

open access: yesJisuanji gongcheng, 2017
Transmission signed file transfer of digital signature technology based on Public Key Infrastructure(PKI) is usually subject to factors such as the environment,the terminal,and the file format between the users,and the signatures between different ...
JIAN Chunfu,XIE Jihua,JIN Junhua
doaj   +1 more source

An Efficient Double Parameter Elliptic Curve Digital Signature Algorithm for Blockchain

open access: yesIEEE Access, 2021
The classic Elliptic curve digital Signature Algorithm (ECDSA) uses one inversion operation in the process of signature and verification, which greatly reduces the efficiency of digital signatures.
Shuang-Gen Liu, Wan-Qi Chen, Jia-Lu Liu
doaj   +1 more source

Digital Signature Implementation as a New Smart Governance Model

open access: yesSociety, 2020
With the times, nothing is impossible with internet technology. One of the advantages of the internet is that it allows for developing it to support creativity and openness to the public, especially ICT-based governance or smart governance, by ...
Nursani Budiarti   +2 more
doaj   +1 more source

Implementation of digital signature technology to improve the interaction in company [PDF]

open access: yesE3S Web of Conferences, 2021
This article discusses the business process of reconciling a memo and improving it using digital signature technology. The technology of business process modeling is applied. Business process models are constructed for their analysis and improvement. The
Khrykova Anastasia   +3 more
doaj   +1 more source

Handwritten Signature Verification using Deep Learning [PDF]

open access: yes, 2020
Every person has his/her own unique signature that is used mainly for the purposes of personal identification and verification of important documents or legal transactions.
Abu-Naser, Samy S.   +6 more
core  

Digital signature scheme for information non-repudiation in blockchain: a state of the art review

open access: yesEURASIP Journal on Wireless Communications and Networking, 2020
Blockchain, as one of the most promising technology, has attracted tremendous attention. The interesting characteristics of blockchain are decentralized ledger and strong security, while non-repudiation is the important property of information security ...
Weidong Fang   +5 more
doaj   +1 more source

Development of Maranatha E-signature Application

open access: yesJuTISI (Jurnal Teknik Informatika dan Sistem Informasi), 2023
Using digital signature in a document, especially in work from home situation, becomes crucial to misuse. The digital signature is a schema to identify somebody uniquely and to prove the originality of a document.
Bernard Renaldy Suteja   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy