Search

Your search keyword '"DIGITAL signatures"' showing total 7,007 results

Search Constraints

Start Over You searched for: Descriptor "DIGITAL signatures" Remove constraint Descriptor: "DIGITAL signatures"
7,007 results on '"DIGITAL signatures"'

Search Results

1. Signcryption technique with generalization of the Elgamal algorithm and Ong-Schnorr-Shamir algorithm on digital messages.

2. Subversion-Resilient Signatures Without Random Oracles

3. Digital Signatures and Quantum Computing

4. SDVS Sender-Privacy in the Multi-party Setting

5. Mobile App Distribution Transparency (MADT): Design and Evaluation of a System to Mitigate Necessary Trust in Mobile App Distribution Systems

6. Enhanced authentication security for IoT client nodes through T-ECDSA integrated into MQTT broker.

7. Certificateless directed signature scheme without bilinear pairing.

8. Blockchain based reputation management, data storage and distributed revocation in vehicular energy networks in smart health care systems.

9. THE VALIDITY OF ELECTRONIC SIGNATURES IN ELECTRONIC TRANSACTIONS FROM THE PERSPECTIVE OF REGULATION NUMBER 71 OF 2019.

10. Implementing electronic signatures of graphene and hexagonal boron nitride in twisted bilayer molybdenum disulfide.

11. Privacy-Preserving Multi-Party Cross-Chain Transaction Protocols.

12. Demerits of Elliptic Curve Cryptosystem with Bitcoin Curves Using Lenstra–Lenstra–Lovasz (LLL) Lattice Basis Reduction.

13. Optimized SeaSign for Enhanced Efficiency

14. STUDY ON THE IMPACT OF SMART CONTRACTS AND DIGITAL SIGNATURES ON THE FINANCIAL LANDSCAPE

15. Perturbative theoretical model of electronic transient circular dichroism spectroscopy of molecular aggregates.

16. The use of blockchain technology in enterprise financial accounting information sharing.

17. Authenticable dynamic quantum multi-secret sharing based on the Chinese remainder theorem.

18. Intention to sign an advance directive among nephrology medical staff and its related factors.

19. An investigating study of blind and ID-based signcryption schemes for misuse risk protection and high performance computing.

20. When blockchain meets IoT: a comparison of the performance of communication protocols in a decentralized identity solution for IoT using blockchain.

21. Armed with Faster Crypto: Optimizing Elliptic Curve Cryptography for ARM Processors.

22. Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network.

23. Desktop application for crypto 169 -protected voice communication.

24. Online electronic signature recognition using sparse classification techniques that support neural models.

25. SELECTING A SUITABLE FRAMEWORK FOR MODELLING THE SPREAD OF THE HUNGARIAN EID CARD.

26. Depict Expressions Of Will In The Electronic Contract.

27. ECC Based Encryption for the Secured Proactive Network Forensic Framework.

28. Experimental quantum digital signature based on heralded single-photon sources.

29. Exploring the solution space: CB-WCA for efficient finite field multiplication in post-quantum cryptography.

30. Digital behavioural signatures reveal trans-diagnostic clusters of Schizophrenia and Alzheimer's disease patients.

31. Dynamic feature analysis of handwritten electronic signatures based on Fourier transform.

32. A novel quantum ring signature based on secret sharing.

33. Evidence of compensated semimetal with electronic correlations at charge neutrality of twisted double bilayer graphene.

34. مدى حجية التوقيع الإلكتروني في ضوء القانون اليمني المعاصر

35. Revised elliptic curve cryptography multi-signature scheme (RECC-MSS) for enhancing security in electronic health record (EHR) system.

36. A Post-Quantum Digital Signature Using Verkle Trees and Lattices.

37. Predicting Cardiopulmonary Arrest with Digital Biomarkers: A Systematic Review.

38. A Blockchain and IPFS-Based Anticounterfeit Traceable Functionality of Car Insurance Claims System.

39. A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions.

40. On the security of two signature schemes for secure communication in IoT environments.

41. Winternitz stack protocols for embedded systems and IoT.

42. Secure ECDSA SRAM-PUF Based on Universal Single/Double Scalar Multiplication Architecture.

43. Quantum Implementation of AIM: Aiming for Low-Depth.

44. A survey on lattice-based digital signature.

45. Large-scale digital signatures of emotional response to the COVID-19 vaccination campaign.

47. Compact Instruction Set Extensions for Dilithium.

48. Post-Quantum Signatures on RISC-V with Hardware Acceleration.

49. Agile Acceleration of Stateful Hash-based Signatures in Hardware.

50. Color image encryption by piecewise function and elliptic curve over the Galois field $ {G}{F}\left({2}^{{n}}\right) $.

Catalog

Books, media, physical & digital resources