Results 311 to 320 of about 3,036,660 (372)
Some of the next articles are maybe not open access.
Internet Research, 1999
The Digital Signature Project (ELU‐project) is coordinated by the STUZZA, a subsidiary of the leading Austrian business banks. The aim of the project is to establish an infrastructure for applying smart card‐based digital signatures in banking and electronic commerce applications.
Helmut Biely, Vesna Hassler
openaire +2 more sources
The Digital Signature Project (ELU‐project) is coordinated by the STUZZA, a subsidiary of the leading Austrian business banks. The aim of the project is to establish an infrastructure for applying smart card‐based digital signatures in banking and electronic commerce applications.
Helmut Biely, Vesna Hassler
openaire +2 more sources
Code-based electronic digital signature
International Conference on Dependable Systems, Services and Technologies, 2018In this paper we consider Code-Based Public-Key Cryptosystems (McElice and Niederreiter schemes). These mechanisms provide high speed conversion and cryptographically strong, it's also holds for the post-quantum period.
A. Kuznetsov+3 more
semanticscholar +1 more source
Digital signature on file using biometric fingerprint with fingerprint sensor on smartphone
2017 International Electronics Symposium on Engineering Technology and Applications (IES-ETA), 2017Digital signature is a term that use a key pair of user for sign and verify a document. People can create their digital signature using biometric technology.
Erika Rahmawati+6 more
semanticscholar +1 more source
A primer on digital signatures and Malaysia's digital signatures act 1997
Computer Law & Security Review, 1998Abstract Digital signature legislation belongs to a genre of new laws that attempt to regulate and facilitate the information age. Although digital signatures and cryptography are a several-decades-old area of applied mathematics, they are only now receiving legal attention.
openaire +2 more sources
The Digital Signature Initiative
1997To help the Web reach its full potential, it is important that end users have a reliable mechanism that allows them to decide what Web content they can trust. In particular, in two classes of documents public trust has become an issue: Active content (e.g. ActiveX controls or Java applets),and documents implying commitments (e.g.
Andreas Sterbenz, Peter Lipp
openaire +2 more sources
A Modified RSA algorithm to enhance security for digital signature
IEEE Annual Information Technology, Electronics and Mobile Communication Conference, 2015Digital signature has been providing security services to secure electronic transaction over internet. Rivest, Shamir and Adlemen (RSA) algorithm was most widely used to provide security technique.
Sangita A. Jaju, S. Chowhan
semanticscholar +1 more source
Digital image authentication and encryption using digital signature
International Conference on Advances in Computer Engineering and Applications, 2015In this paper, a methodology for digital image authentication using digital signature is proposed. The hash of the original image is taken and is encrypted by RSA. The digital signature obtained is concealed in the image.
S. Alam+3 more
semanticscholar +1 more source
Digital Signatures and Barcodes
2017Throughout this book two form fields were not discussed in great detail in regards to JavaScript: digital signatures and barcodes. Thus, this chapter focuses on them. Let’s first look at how they and other fields relate to security.
openaire +2 more sources
Blockchain-based Lamport Merkle Digital Signature: Authentication tool in IoT healthcare
Computer Communications, 2021J. Alzubi
semanticscholar +1 more source
Cryptologia, 1982
This paper introduces four new digital signature schemes for computer communication networks. These involve one or more arbitrators who validate and authenticate messages and signatures without having access to the actual contents of the messages.
Henk Meijer, Selim G. Akl
openaire +2 more sources
This paper introduces four new digital signature schemes for computer communication networks. These involve one or more arbitrators who validate and authenticate messages and signatures without having access to the actual contents of the messages.
Henk Meijer, Selim G. Akl
openaire +2 more sources