Results 21 to 30 of about 3,034,845 (338)

Dynamic Signature Verification Technique for the Online and Offline Representation of Electronic Signatures in Biometric Systems

open access: yesProcesses, 2023
Biometric systems input physical or personal human characteristics for identification, authentication, and security purposes. With the advancement in communication and intelligent security systems, biometrics are programmed to validate electronic ...
Juanjuan Huang, Yuhang Xue, Linhui Liu
semanticscholar   +1 more source

Digital Transformation of Signatures: Suggesting Functional Symmetry Approach for Loan Agreements

open access: yesComputation, 2022
This article aims to formulate proposals for regulatory bodies whose implementation would ensure the effective introduction of civil circulation into electronic signatures, with minimal costs for economic entities.
Viktor Titov   +10 more
doaj   +1 more source

Method of Two-Factor Authentication of Electronic Documents Using Enhanced Encrypted Non-Certified Digital Signature with the Use of Security Token with Biometric Data [PDF]

open access: yesTelfor Journal, 2023
The purpose of this study is to develop a method for two-factor authentication of electronic documents using an enhanced encrypted non-certified digital signature with the use of a security token with biometric data (fingerprint image).
T. A. Burganova   +2 more
doaj   +1 more source

Service for Verification of Electronic Document’s Certificates

open access: yesЦифровая трансформация, 2023
The legislation of the Republic of Belarus currently establishes the same legal force for identical documents on paper and in electronic form, which have a mandatory requisite - an electronic digital signature.
I. O. Tolokh   +2 more
doaj   +1 more source

Examining the Challenges and Removing the Conflict of Electronic Procedure Rules in Iranian Legal System with a Comparative View to French Law [PDF]

open access: yesپژوهش تطبیقی حقوق اسلام و غرب, 2020
Proper implementation of the law in order to establish justice is the concern of all legal systems and requires some changes in the course of procedure. Some changes, due to the increasing progress of new communication methods, in addition to providing a
mehdi vahdati   +3 more
doaj   +1 more source

Provably Secure Linearly Homomorphic Aggregate Signature Scheme for Electronic Healthcare System

open access: yesMathematics, 2022
In recent years, deploying Internet of Things (IoT) in electronic healthcare systems (EHS) has made great progress in healthcare detection. It is extremely important to reduce the cost of communication and ensure the authenticity and integrity of data. A
Yanyan Gu   +3 more
semanticscholar   +1 more source

مكانة التوقيع الإلكتروني في قانون الإثبات: دراسة تحليلية

open access: yesMalaysian Journal of Syariah and Law, 2019
This study aims to discuss one of the effects of modern development in the law of evidence, focusing on the status of electronic signature on the occasion of the recent developments of information technology. This is due to the various approaches to the
TENGKU SAIPULIZAN TENGKU HUSSAIN   +1 more
doaj   +1 more source

Electronic Signature

open access: yesDefinitions, 2020
Symbols or other data in digital form attached to an electronically transmitted document as verification of the sender's intent to sign the document.

semanticscholar   +1 more source

The regulation of peculiarities of electronic contracting: comparative analysis

open access: yesПроблеми Законності, 2017
Contract formation by electronic means nowadays is a widespread phenomenon. Nevertheless electronic contracting has been thoroughly explored by scholars all over the world and regulated both internationally and domestically, there still remain some ...
Наталія Юліївна Філатова
doaj   +1 more source

Data integrity and security of digital signatures on electronic systems using the digital signature algorithm (DSA)

open access: yesInternational Journal of Electronics and Communications Systems, 2021
The digital signature generation process begins with the creation of a public key and a private key. A public key is generated and published to verify the signature and calculate the hash value of the received document.
Asep Saepulrohman, Agus Ismangil
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy