Results 301 to 310 of about 3,545,158 (344)
Some of the next articles are maybe not open access.
Improved IoT Device Authentication Scheme Using Device Capability and Digital Signatures
International Conference on Advanced Energy Materials, 2018Internet of Things (IoT) device authentication is weighed as a very important step from security perspective. Privacy and security of the IoT devices and applications is the major issue.
Zahoor Ahmed Alizai +2 more
semanticscholar +1 more source
Proof-of-Principle Demonstration of Passive Decoy-State Quantum Digital Signatures Over 200 km
Physical Review Applied, 2018The authors demonstrate that passive decoy-state quantum digital signature (QDS) using parametric down-conversion sources can be used effectively for encrypted communication over a distance of 200 km.
Chun-Hui Zhang +5 more
semanticscholar +1 more source
2016
How sonically distinctive digital “signatures”—including reverb, glitches, and autotuning—affect the aesthetics of popular music, analyzed in works by Prince, Lady Gaga, and others. Is digital production killing the soul of music? Is Auto-Tune the nadir of creative expression? Digital technology has changed not only how music is produced,
Ragnhild Brøvig, Anne Danielsen
openaire +2 more sources
How sonically distinctive digital “signatures”—including reverb, glitches, and autotuning—affect the aesthetics of popular music, analyzed in works by Prince, Lady Gaga, and others. Is digital production killing the soul of music? Is Auto-Tune the nadir of creative expression? Digital technology has changed not only how music is produced,
Ragnhild Brøvig, Anne Danielsen
openaire +2 more sources
Progress in experimental quantum digital signatures
Optical Engineering + Applications, 2018There is ongoing research into information-theoretically secure digital signature schemes. Mathematically based approaches typically require additional resources such as anonymous broadcast and/or a trusted authority to achieve information-theoretical ...
R. Collins, R. Donaldson, G. Buller
semanticscholar +1 more source
Proceedings of the 1st ACM conference on Computer and communications security - CCS '93, 1993
Digital Signature (DS) technology may be employed to produce legally enforceable signatures in Electronic Data Interchange (EDI) among computer users within the same general guidelines and requirements as those developed for handwritten signatures on paper. Digital signature technology promises assurance at least equal to written signatures.
openaire +1 more source
Digital Signature (DS) technology may be employed to produce legally enforceable signatures in Electronic Data Interchange (EDI) among computer users within the same general guidelines and requirements as those developed for handwritten signatures on paper. Digital signature technology promises assurance at least equal to written signatures.
openaire +1 more source
Take your MEDS: Digital Signatures from Matrix Code Equivalence
IACR Cryptology ePrint Archive, 2022T. Chou +6 more
semanticscholar +1 more source
Cryptanalysis of multiparty quantum digital signatures
Quantum Information Processing, 2019Xiao-Qiu Cai +3 more
semanticscholar +1 more source

