Search
Search Results
-
Browser Extension for Digital Signature
In the current era, it is most crucial for the organisations to expand their operations in the market environment and economic situations for... -
New Variant of the GOST Digital Signature Protocol
In this paper we propose a new variant of GOST R 34.10-2012 digital signature algorithm. We modified the signature equation to make it more secure... -
Quantum-Resistant Hash-Based Digital Signature Schemes: A Review
Our trust in traditional digital signature schemes has been shaken by the current development toward quantum computers. Digital signatures are... -
A Proficient Digital Signature Scheme Using Lightweight Cryptography
Internet of things (IoT) refers to the collective network of connected devices and the technology that facilitates communication between devices and... -
Secure authentication and key management based on hierarchical enhanced identity based digital signature in heterogeneous wireless sensor network
Nowadays, secured data transmission has become the most desired need for all networks. Ensuring secure authentication and data transmission in the...
-
Quantum-defended Digital Signature on Lattice for IoT-enabled Systems
Information exchange through unsecured platforms (including various sorts of documents, photos, and videos) is common nowadays since these platforms... -
Multivariate Aggregate and Multi-signature Scheme
Multi-signature scheme allows a group of signers to construct a digital signature on the same message collectively. On the other hand, aggregate... -
RETRACTED ARTICLE: A proficient technique for recognizing the online digital signature in Project Registration System (PRS)
In recent education system, project submission is crucial for college students to complete their respective studies. The understudies needed to...
-
Enhancing the 5G-AKA Protocol with Post-quantum Digital Signature Method
Data communicated in 5G is crucial to the operation of many areas in our society which are under constant cyber-attacks. The Authenticated Key... -
CA-Free Real-Time Fuzzy Digital Signature Scheme
Digital signature has been playing a very important role in electronic money transactions while memorizing and storing keys for digital signatures... -
Man-in-the-Middle Attack Mitigation in IoT Sensors with Hash Based Multidimensional Lamport Digital Signature
Device authentication is a serious security risk for the Internet of Things (IoT). As a result, the privacy and security of IoT sensors are the most... -
Constructing Digital Signature Algorithm Based on a New Key Scheme
Xuan, Van Luu Van, Hoa Doan Hong, Dung LuuE-government is the latest trend in many countries in which the government is using the online system for... -
A blockchain-based hybrid encryption technique with anti-quantum signature for securing electronic health records
Electronic health records (EHRs) are important for the efficient management of healthcare data. However, Healthcare data travels across an open...
-
Ensuring Data Integrity Using Digital Signature in an IoT Environment
The Internet of Things (IoT) devices produce large amounts of data which increase their susceptibility to cyber attacks. Data Integrity attack is a... -
A Study on Designated Verifier Signature Schemes and Their Variants
Designated verifier signatures (DVSs) represent a specific type of digital signature that holds significance exclusively for a designated verifier.... -
Multivariate Partially Blind Signature Scheme
In e-cash, blind signature provides perfect anonymity, which causes the threat of managing an infinite database to prevent double-spending of... -
FlexHi: A Flexible Hierarchical Threshold Signature Scheme
Threshold signature schemes have gained prominence in enhancing the security and flexibility of digital signatures, allowing a group of participants... -
Music time signature detection using ResNet18
Time signature detection is a fundamental task in music information retrieval, aiding in music organization. In recent years, the demand for robust...
-
An Efficient Group Signature Scheme Based on ECDLP
In today’s digital world, group signature plays an important role for different security aspects in institutions, government organizations, etc.... -
Pairing-Free Identity-Based Digital Signature Algorithm for Broadcast Authentication Based on Modified ECC Using Battle Royal Optimization Algorithm
In wireless sensor networks (WSN), broadcast authentication is an important security service that provides secure communication. Several mobile users...