Results 21 to 30 of about 595,335 (304)
Implementation of digital signature technology to improve the interaction in company [PDF]
This article discusses the business process of reconciling a memo and improving it using digital signature technology. The technology of business process modeling is applied. Business process models are constructed for their analysis and improvement. The
Khrykova Anastasia +3 more
doaj +1 more source
Digital Signature Security in Data Communication
Authenticity of access in very information are very important in the current era of Internet-based technology, there are many ways to secure information from irresponsible parties with various security attacks, some of technique can use for defend attack
Abdillah, Leon Andretti +8 more
core +1 more source
SPHINCS$^+$ post-quantum digital signature scheme with Streebog hash function
Many commonly used public key cryptosystems will become insecure once a scalable quantum computer is built. New cryptographic schemes that can guarantee protection against attacks with quantum computers, so-called post-quantum algorithms, have emerged in
Anufriev, M. N. +5 more
core +1 more source
Development of Maranatha E-signature Application
Using digital signature in a document, especially in work from home situation, becomes crucial to misuse. The digital signature is a schema to identify somebody uniquely and to prove the originality of a document.
Bernard Renaldy Suteja +2 more
doaj +1 more source
Quantum signature scheme with single photons
Quantum digital signature combines quantum theory with classical digital signature. The main goal of this field is to take advantage of quantum effects to provide unconditionally secure signature.
A. Ekert +12 more
core +1 more source
Model Digital Signature pada Dokumen Formal Akademik [PDF]
Digital signature system is implemented to improve the quality of document border services. A digital signature on a document means that the signatory knows and approves the document. On the other hand, previous research states that the digital signature
Henderi, H. (Henderi) +2 more
core
Improved method for SNR prediction in machine-learning-based test [PDF]
This paper applies an improved method for testing the signal-to-noise ratio (SNR) of Analogue-to-Digital Converters (ADC). In previous work, a noisy and nonlinear pulse signal is exploited as the input stimulus to obtain the signature results of ADC.
Kerkhoff, Hans G., Sheng, Xiaoqin
core +2 more sources
Robust monomer-distribution biosignatures in evolving digital biota [PDF]
Because organisms synthesize component molecules at rates that reflect those molecules' adaptive utility, we expect a population of biota to leave a distinctive chemical signature on their environment that is anomalous given the local (abiotic) chemistry.
Abelson P.H. +3 more
core +3 more sources
The Caenorhabditis elegans DPF‐3 and human DPP4 have tripeptidyl peptidase activity
The dipeptidyl peptidase IV (DPPIV) family comprises serine proteases classically defined by their ability to remove dipeptides from the N‐termini of substrates, a feature that gave the family its name. Here, we report the discovery of a previously unrecognized tripeptidyl peptidase activity in DPPIV family members from two different species.
Aditya Trivedi, Rajani Kanth Gudipati
wiley +1 more source
Design and implementation of proxy-protected proxy signature based on SM2
Based on the SM2 digital signature standard,a proxy-protected proxy signature scheme was designed.Through the design of the agent authorization mechanism,the protection of the proxy signer was realized.The proxy signature was realized by the proxy signer
Qing-xiao GUO,Da-wei ZHANG,Jing-wen SONG +2 more
doaj +3 more sources

