Results 201 to 210 of about 3,036,561 (273)
Some of the next articles are maybe not open access.
Design and Implementation of an Efficient Elliptic Curve Digital Signature Algorithm (ECDSA)
2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), 2021Digital signatures are increasingly used today. It replaces wet signature with the development of technology. Elliptic curve digital signature algorithm (ECDSA) is used in many applications thanks to its security and efficiency.
Yasin Genç, E. Afacan
semanticscholar +1 more source
Smart Digital Signature berbasis Blockchain pada Pendidikan Tinggi menggunakan Metode SWOT
ADI Bisnis Digital Interdisiplin Jurnal, 2021Validasi dokumen merupakan hal yang sangat penting dalam menyangkut keaslian aset digital pemilik. Dimana validasi dokumen saat ini masih bersifat tradisional dengan mengunjungi tempat tersebut. Namun, saat pandemi proses validasi dokumen tidak dilakukan
Mohamad Rakhmansyah+4 more
semanticscholar +1 more source
2012 International Conference on Computing Sciences, 2012
There are different types of encryption techniques are being used to ensure the privacy of data transmitted over internet. Digital Signature is a mathematical scheme which ensures the privacy of conversation, integrity of data, authenticity of digital message/sender and non-repudiation of sender. Digital Signature is embedded in some hardware device or
Ravneet Kaur, Amandeep Kaur
openaire +2 more sources
There are different types of encryption techniques are being used to ensure the privacy of data transmitted over internet. Digital Signature is a mathematical scheme which ensures the privacy of conversation, integrity of data, authenticity of digital message/sender and non-repudiation of sender. Digital Signature is embedded in some hardware device or
Ravneet Kaur, Amandeep Kaur
openaire +2 more sources
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
SIAM journal on computing (Print), 1988We present a digital signature scheme based on the computational difficulty of integer factorization. The scheme possesses the novel property of being robust against an adaptive chosen-message attack: an adversary who receives signatures for messages of ...
S. Goldwasser, S. Micali, R. Rivest
semanticscholar +1 more source
Electronic signature based on digital signature and digital watermarking
2012 5th International Congress on Image and Signal Processing, 2012In this paper, an electronic signature algorithm, using a combined technology of digital signature, digital watermarking and time stamp, is presented. In this algorithm timestamp information is added to digital signature data, improving the signature safety and anti- offensive.
Lizhe Zhu, Likun Zhu
openaire +2 more sources
A blockchain approach to digital archiving: digital signature certification chain preservation
, 2020Purpose The short lifespan of digital signatures presents a challenge to the long-term preservation of digitally signed records. It can undermine attempts to presume, verify or assess their authenticity.
Vladimir Bralić+2 more
semanticscholar +1 more source
On the validity of digital signatures
ACM SIGCOMM Computer Communication Review, 2000An important feature of digital signatures is to serve as non-repudiation evidence. To be eligible as non-repudiation evidence, a digital signature on an electronic document should remain valid until its expiry date which is specified by some non-repudiation policy.
Zhou, J., DENG, Robert H.
openaire +3 more sources
Embedding Digital Signature Using Encrypted-Hashing for Protection of DSP Cores in CE
IEEE transactions on consumer electronics, 2019Reusable intellectual property (IP) cores from signal processing and multimedia form an integral part of consumer electronics (CE) systems. However, owing to the value it represents, it needs protection against important threats, such as piracy and ...
A. Sengupta, E. R. Kumar, N. Chandra
semanticscholar +1 more source
Practical quantum digital signature with a gigahertz BB84 quantum key distribution system.
Optics Letters, 2019Quantum digital signature (QDS) can guarantee message integrity and non-repudiation with information-theoretical security, and it has attracted more attention recently. Since proposed by Andersson et al. [Phys. Rev.
Xue-Bi An+12 more
semanticscholar +1 more source
On the Incremental Digital Signatures
2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2018The purpose of incremental cryptography is to enable updates of cryptographic forms of documents undergoing modifications, more efficiently than if we had to recompute them from scratch. This paper defines a framework for securely using a variant of the incremental hash function designed by Goi, Siddiqi and Chuah.
openaire +3 more sources