Results 311 to 320 of about 3,036,660 (372)
Some of the next articles are maybe not open access.

Digital signature management

Internet Research, 1999
The Digital Signature Project (ELU‐project) is coordinated by the STUZZA, a subsidiary of the leading Austrian business banks. The aim of the project is to establish an infrastructure for applying smart card‐based digital signatures in banking and electronic commerce applications.
Helmut Biely, Vesna Hassler
openaire   +2 more sources

Code-based electronic digital signature

International Conference on Dependable Systems, Services and Technologies, 2018
In this paper we consider Code-Based Public-Key Cryptosystems (McElice and Niederreiter schemes). These mechanisms provide high speed conversion and cryptographically strong, it's also holds for the post-quantum period.
A. Kuznetsov   +3 more
semanticscholar   +1 more source

Digital signature on file using biometric fingerprint with fingerprint sensor on smartphone

2017 International Electronics Symposium on Engineering Technology and Applications (IES-ETA), 2017
Digital signature is a term that use a key pair of user for sign and verify a document. People can create their digital signature using biometric technology.
Erika Rahmawati   +6 more
semanticscholar   +1 more source

A primer on digital signatures and Malaysia's digital signatures act 1997

Computer Law & Security Review, 1998
Abstract Digital signature legislation belongs to a genre of new laws that attempt to regulate and facilitate the information age. Although digital signatures and cryptography are a several-decades-old area of applied mathematics, they are only now receiving legal attention.
openaire   +2 more sources

The Digital Signature Initiative

1997
To help the Web reach its full potential, it is important that end users have a reliable mechanism that allows them to decide what Web content they can trust. In particular, in two classes of documents public trust has become an issue: Active content (e.g. ActiveX controls or Java applets),and documents implying commitments (e.g.
Andreas Sterbenz, Peter Lipp
openaire   +2 more sources

A Modified RSA algorithm to enhance security for digital signature

IEEE Annual Information Technology, Electronics and Mobile Communication Conference, 2015
Digital signature has been providing security services to secure electronic transaction over internet. Rivest, Shamir and Adlemen (RSA) algorithm was most widely used to provide security technique.
Sangita A. Jaju, S. Chowhan
semanticscholar   +1 more source

Digital image authentication and encryption using digital signature

International Conference on Advances in Computer Engineering and Applications, 2015
In this paper, a methodology for digital image authentication using digital signature is proposed. The hash of the original image is taken and is encrypted by RSA. The digital signature obtained is concealed in the image.
S. Alam   +3 more
semanticscholar   +1 more source

Digital Signatures and Barcodes

2017
Throughout this book two form fields were not discussed in great detail in regards to JavaScript: digital signatures and barcodes. Thus, this chapter focuses on them. Let’s first look at how they and other fields relate to security.
openaire   +2 more sources

DIGITAL SIGNATURE SCHEMES

Cryptologia, 1982
This paper introduces four new digital signature schemes for computer communication networks. These involve one or more arbitrators who validate and authenticate messages and signatures without having access to the actual contents of the messages.
Henk Meijer, Selim G. Akl
openaire   +2 more sources

Home - About - Disclaimer - Privacy