We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Browser Extension for Digital Signature

    In the current era, it is most crucial for the organisations to expand their operations in the market environment and economic situations for...
    Yerra Maithri, Ashutosh Saxena in Computer Communication, Networking and IoT
    Conference paper 2023
  2. New Variant of the GOST Digital Signature Protocol

    In this paper we propose a new variant of GOST R 34.10-2012 digital signature algorithm. We modified the signature equation to make it more secure...
    Chapter 2024
  3. Quantum-Resistant Hash-Based Digital Signature Schemes: A Review

    Our trust in traditional digital signature schemes has been shaken by the current development toward quantum computers. Digital signatures are...
    Conference paper 2024
  4. A Proficient Digital Signature Scheme Using Lightweight Cryptography

    Internet of things (IoT) refers to the collective network of connected devices and the technology that facilitates communication between devices and...
    D. Satya Bhavani, M. Krishna Paramathma, N. Likhitha Varma in Proceedings of the 2nd International Conference on Cognitive and Intelligent Computing
    Conference paper 2023
  5. Secure authentication and key management based on hierarchical enhanced identity based digital signature in heterogeneous wireless sensor network

    Nowadays, secured data transmission has become the most desired need for all networks. Ensuring secure authentication and data transmission in the...

    Siddiq Iqbal, B. R. Sujatha in Wireless Networks
    Article 06 May 2024
  6. Quantum-defended Digital Signature on Lattice for IoT-enabled Systems

    Information exchange through unsecured platforms (including various sorts of documents, photos, and videos) is common nowadays since these platforms...
    Daya Sagar Gupta, Lacchita Soni, Harish Chandra in Internet of Things (IoT): Key Digital Trends Sha** the Future
    Conference paper 2023
  7. Multivariate Aggregate and Multi-signature Scheme

    Multi-signature scheme allows a group of signers to construct a digital signature on the same message collectively. On the other hand, aggregate...
    Satyam Omar, Sahadeo Padhye, Dhananjoy Dey in Cryptology and Network Security with Machine Learning
    Conference paper 2024
  8. RETRACTED ARTICLE: A proficient technique for recognizing the online digital signature in Project Registration System (PRS)

    In recent education system, project submission is crucial for college students to complete their respective studies. The understudies needed to...

    R. Ravi Chakravarthi, C. Anna Palagan, ... Shrikant Taware in Soft Computing
    Article 18 April 2022
  9. Enhancing the 5G-AKA Protocol with Post-quantum Digital Signature Method

    Data communicated in 5G is crucial to the operation of many areas in our society which are under constant cyber-attacks. The Authenticated Key...
    Gabriel Rossi Figlarz, Fabiano Passuelo Hessel in Advanced Information Networking and Applications
    Conference paper 2024
  10. CA-Free Real-Time Fuzzy Digital Signature Scheme

    Digital signature has been playing a very important role in electronic money transactions while memorizing and storing keys for digital signatures...
    Conference paper 2022
  11. Man-in-the-Middle Attack Mitigation in IoT Sensors with Hash Based Multidimensional Lamport Digital Signature

    Device authentication is a serious security risk for the Internet of Things (IoT). As a result, the privacy and security of IoT sensors are the most...
    T Bebin Josey, D. S. Misbha in International Virtual Conference on Industry 4.0
    Conference paper 2023
  12. Constructing Digital Signature Algorithm Based on a New Key Scheme

    Xuan, Van Luu Van, Hoa Doan Hong, Dung LuuE-government is the latest trend in many countries in which the government is using the online system for...
    Van Luu Xuan, Hoa Doan Van, Dung Luu Hong in ICT Analysis and Applications
    Conference paper 2022
  13. A blockchain-based hybrid encryption technique with anti-quantum signature for securing electronic health records

    Electronic health records (EHRs) are important for the efficient management of healthcare data. However, Healthcare data travels across an open...

    Shtwai Alsubai, Abdullah Alqahtani, ... Abdu Gumaei in Complex & Intelligent Systems
    Article Open access 31 May 2024
  14. Ensuring Data Integrity Using Digital Signature in an IoT Environment

    The Internet of Things (IoT) devices produce large amounts of data which increase their susceptibility to cyber attacks. Data Integrity attack is a...
    Nadia Kammoun, Aida ben Chehida Douss, ... Sihem Guemara el Fatmi in Advanced Information Networking and Applications
    Conference paper 2022
  15. A Study on Designated Verifier Signature Schemes and Their Variants

    Designated verifier signatures (DVSs) represent a specific type of digital signature that holds significance exclusively for a designated verifier....
    Conference paper 2024
  16. Multivariate Partially Blind Signature Scheme

    In e-cash, blind signature provides perfect anonymity, which causes the threat of managing an infinite database to prevent double-spending of...
    Satyam Omar, Sahadeo Padhye, Dhananjoy Dey in Computational Intelligence
    Conference paper 2023
  17. FlexHi: A Flexible Hierarchical Threshold Signature Scheme

    Threshold signature schemes have gained prominence in enhancing the security and flexibility of digital signatures, allowing a group of participants...
    Muhammed Ali Bingol, Sermin Kocaman, ... Sibel Kurt Toplu in Intelligent Computing
    Conference paper 2024
  18. Music time signature detection using ResNet18

    Time signature detection is a fundamental task in music information retrieval, aiding in music organization. In recent years, the demand for robust...

    Jeremiah Abimbola, Daniel Kostrzewa, Pawel Kasprowski in EURASIP Journal on Audio, Speech, and Music Processing
    Article Open access 13 June 2024
  19. An Efficient Group Signature Scheme Based on ECDLP

    In today’s digital world, group signature plays an important role for different security aspects in institutions, government organizations, etc....
    Namita Tiwari, Amit Virmani, Ashutosh Tripathi in Proceedings of International Conference on Data Science and Applications
    Conference paper 2023
  20. Pairing-Free Identity-Based Digital Signature Algorithm for Broadcast Authentication Based on Modified ECC Using Battle Royal Optimization Algorithm

    In wireless sensor networks (WSN), broadcast authentication is an important security service that provides secure communication. Several mobile users...

    Vivek Kumar, Sangram Ray in Wireless Personal Communications
    Article 01 November 2021
Did you find what you were looking for? Share feedback.