Results 61 to 70 of about 133,340 (231)

Optimization Digital Image Watermarking Technique for Patent Protection [PDF]

open access: yesJournal of Computing, Volume 2, Issue 2, February 2010, https://sites.google.com/site/journalofcomputing/, 2010
The rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threats. It is a big security and privacy issue.
arxiv  

AES Based White Box Cryptography in Digital Signature Verification. [PDF]

open access: yesSensors (Basel), 2022
Shukla PK   +4 more
europepmc   +1 more source

Performance Evaluation and Analysis of IEC 62351-6 Probabilistic Signature Scheme for Securing GOOSE Messages

open access: yesIEEE Access, 2019
Cyber security is a growing concern in power systems. To achieve security requirements such as authentication and integrity for generic object-oriented substation event (GOOSE) messages, IEC 62351-6 standard recommends using digital signatures ...
Shaik Mullapathi Farooq   +2 more
doaj   +1 more source

Implementation of digital signatures

open access: yesElectronics Letters, 1982
A digital signature scheme can be valid only if the message to be signed contains some predetermining redundant information. There is a considerable waste in applying the slow and complex signature algorithm on the entire message. The letter presents a way of implementing a digital signature scheme having the property that the complex steps are applied
openaire   +2 more sources

Group–Proxy Signature Scheme: A Novel Solution to Electronic Cash

open access: yesJournal of Intelligent Systems, 2013
Proxy signature and group signature are two basic cryptographic primitives. Due to their valuable characteristics, many schemes have been put forward independently and they have been applied in many practical scenarios up to the present.
Bao Haiyong, Cao Zhenfu
doaj   +1 more source

Fail-Stop Group Signature Scheme [PDF]

open access: yesarXiv, 2018
In this paper, we propose a Fail-Stop Group Signature Scheme (FSGSS). FSGSS combines the features of the Group Signature and the Fail-Stop Signature to enhance the security level of the original Group Signature. Assuming that the FSGSS encounters an attack by a hacker armed with a supercomputer, this scheme can prove that the digital signature is ...
arxiv  

Home - About - Disclaimer - Privacy