Search

Your search keyword '"DIGITAL signatures"' showing total 1,925 results

Search Constraints

Start Over You searched for: Descriptor "DIGITAL signatures" Remove constraint Descriptor: "DIGITAL signatures" Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection
1,925 results on '"DIGITAL signatures"'

Search Results

1. Signcryption technique with generalization of the Elgamal algorithm and Ong-Schnorr-Shamir algorithm on digital messages.

2. Controlled blockchain enabled data record security for healthcare applications.

3. Research on blockchain smart contract technology based on resistance to quantum computing attacks.

4. Enhanced authentication security for IoT client nodes through T-ECDSA integrated into MQTT broker.

5. Certificateless directed signature scheme without bilinear pairing.

6. Quantum homomorphic aggregate signature based on quantum Fourier transform.

7. Blockchain based reputation management, data storage and distributed revocation in vehicular energy networks in smart health care systems.

8. Semi-quantum blind double signature scheme with semi-trusted arbitrator.

9. Perturbative theoretical model of electronic transient circular dichroism spectroscopy of molecular aggregates.

10. THE VALIDITY OF ELECTRONIC SIGNATURES IN ELECTRONIC TRANSACTIONS FROM THE PERSPECTIVE OF REGULATION NUMBER 71 OF 2019.

11. Implementing electronic signatures of graphene and hexagonal boron nitride in twisted bilayer molybdenum disulfide.

12. Privacy-Preserving Multi-Party Cross-Chain Transaction Protocols.

13. Demerits of Elliptic Curve Cryptosystem with Bitcoin Curves Using Lenstra–Lenstra–Lovasz (LLL) Lattice Basis Reduction.

14. The use of blockchain technology in enterprise financial accounting information sharing.

15. Authenticable dynamic quantum multi-secret sharing based on the Chinese remainder theorem.

16. Intention to sign an advance directive among nephrology medical staff and its related factors.

17. An investigating study of blind and ID-based signcryption schemes for misuse risk protection and high performance computing.

18. When blockchain meets IoT: a comparison of the performance of communication protocols in a decentralized identity solution for IoT using blockchain.

19. Armed with Faster Crypto: Optimizing Elliptic Curve Cryptography for ARM Processors.

20. Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network.

21. Desktop application for crypto 169 -protected voice communication.

22. Online electronic signature recognition using sparse classification techniques that support neural models.

23. SELECTING A SUITABLE FRAMEWORK FOR MODELLING THE SPREAD OF THE HUNGARIAN EID CARD.

24. Depict Expressions Of Will In The Electronic Contract.

25. ECC Based Encryption for the Secured Proactive Network Forensic Framework.

26. Experimental quantum digital signature based on heralded single-photon sources.

27. Exploring the solution space: CB-WCA for efficient finite field multiplication in post-quantum cryptography.

28. Digital behavioural signatures reveal trans-diagnostic clusters of Schizophrenia and Alzheimer's disease patients.

29. Dynamic feature analysis of handwritten electronic signatures based on Fourier transform.

30. A methodical study on digital image forensics and counterfeit detection techniques.

31. Designing and building a web-based electronic service manuscript application by making comparisons of AES and blowfish algorithms for securing data in the database.

32. Enhancement digital data security using digital signatures as a form of implementing smart campus management.

33. FPGA implementation of novel hybrid hash function SHѦES for digital signatures.

34. A novel quantum ring signature based on secret sharing.

35. Evidence of compensated semimetal with electronic correlations at charge neutrality of twisted double bilayer graphene.

36. مدى حجية التوقيع الإلكتروني في ضوء القانون اليمني المعاصر

37. Revised elliptic curve cryptography multi-signature scheme (RECC-MSS) for enhancing security in electronic health record (EHR) system.

38. A Post-Quantum Digital Signature Using Verkle Trees and Lattices.

39. Predicting Cardiopulmonary Arrest with Digital Biomarkers: A Systematic Review.

40. A Blockchain and IPFS-Based Anticounterfeit Traceable Functionality of Car Insurance Claims System.

41. A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions.

42. SPANSE: Combining sparsity with density for efficient one-time code-based digital signatures.

43. Analysis and Design of Identity Authentication for IoT Devices in the Blockchain Using Hashing and Digital Signature Algorithms.

44. Performance and Applicability of Post-Quantum Digital Signature Algorithms in Resource-Constrained Environments.

45. A Comprehensive Analysis: Evaluating Security Characteristics of Xbee Devices against Zigbee Protocol.

46. Combining Smart Construction Objects–Enabled Blockchain Oracles and Signature Techniques to Ensure Information Authentication and Integrity in Construction.

47. On One-Way Ring Homomorphisms.

48. Obesity Is Associated with the Severity of Periodontal Inflammation Due to a Specific Signature of Subgingival Microbiota.

49. THE COMPARATIVE ANALYSIS OF LEGAL REGULATIONS PERTAINING TO DIGITAL AUTHENTICATION EU.

50. Enhancing IoT Security through a Green and Sustainable Federated Learning Platform: Leveraging Efficient Encryption and the Quondam Signature Algorithm.

Catalog

Books, media, physical & digital resources