Results 201 to 210 of about 3,036,561 (273)
Some of the next articles are maybe not open access.

Design and Implementation of an Efficient Elliptic Curve Digital Signature Algorithm (ECDSA)

2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), 2021
Digital signatures are increasingly used today. It replaces wet signature with the development of technology. Elliptic curve digital signature algorithm (ECDSA) is used in many applications thanks to its security and efficiency.
Yasin Genç, E. Afacan
semanticscholar   +1 more source

Smart Digital Signature berbasis Blockchain pada Pendidikan Tinggi menggunakan Metode SWOT

ADI Bisnis Digital Interdisiplin Jurnal, 2021
Validasi dokumen merupakan hal yang sangat penting dalam menyangkut keaslian aset digital pemilik. Dimana validasi dokumen saat ini masih bersifat tradisional dengan mengunjungi tempat tersebut. Namun, saat pandemi proses validasi dokumen tidak dilakukan
Mohamad Rakhmansyah   +4 more
semanticscholar   +1 more source

Digital Signature

2012 International Conference on Computing Sciences, 2012
There are different types of encryption techniques are being used to ensure the privacy of data transmitted over internet. Digital Signature is a mathematical scheme which ensures the privacy of conversation, integrity of data, authenticity of digital message/sender and non-repudiation of sender. Digital Signature is embedded in some hardware device or
Ravneet Kaur, Amandeep Kaur
openaire   +2 more sources

A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks

SIAM journal on computing (Print), 1988
We present a digital signature scheme based on the computational difficulty of integer factorization. The scheme possesses the novel property of being robust against an adaptive chosen-message attack: an adversary who receives signatures for messages of ...
S. Goldwasser, S. Micali, R. Rivest
semanticscholar   +1 more source

Electronic signature based on digital signature and digital watermarking

2012 5th International Congress on Image and Signal Processing, 2012
In this paper, an electronic signature algorithm, using a combined technology of digital signature, digital watermarking and time stamp, is presented. In this algorithm timestamp information is added to digital signature data, improving the signature safety and anti- offensive.
Lizhe Zhu, Likun Zhu
openaire   +2 more sources

A blockchain approach to digital archiving: digital signature certification chain preservation

, 2020
Purpose The short lifespan of digital signatures presents a challenge to the long-term preservation of digitally signed records. It can undermine attempts to presume, verify or assess their authenticity.
Vladimir Bralić   +2 more
semanticscholar   +1 more source

On the validity of digital signatures

ACM SIGCOMM Computer Communication Review, 2000
An important feature of digital signatures is to serve as non-repudiation evidence. To be eligible as non-repudiation evidence, a digital signature on an electronic document should remain valid until its expiry date which is specified by some non-repudiation policy.
Zhou, J., DENG, Robert H.
openaire   +3 more sources

Embedding Digital Signature Using Encrypted-Hashing for Protection of DSP Cores in CE

IEEE transactions on consumer electronics, 2019
Reusable intellectual property (IP) cores from signal processing and multimedia form an integral part of consumer electronics (CE) systems. However, owing to the value it represents, it needs protection against important threats, such as piracy and ...
A. Sengupta, E. R. Kumar, N. Chandra
semanticscholar   +1 more source

Practical quantum digital signature with a gigahertz BB84 quantum key distribution system.

Optics Letters, 2019
Quantum digital signature (QDS) can guarantee message integrity and non-repudiation with information-theoretical security, and it has attracted more attention recently. Since proposed by Andersson et al. [Phys. Rev.
Xue-Bi An   +12 more
semanticscholar   +1 more source

On the Incremental Digital Signatures

2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2018
The purpose of incremental cryptography is to enable updates of cryptographic forms of documents undergoing modifications, more efficiently than if we had to recompute them from scratch. This paper defines a framework for securely using a variant of the incremental hash function designed by Goi, Siddiqi and Chuah.
openaire   +3 more sources

Home - About - Disclaimer - Privacy