نتایج جستجو برای: qualifications for secured electronic signature

تعداد نتایج: 10439479  

2008
Chun-I Fan Ming-Te Chen

This manuscript presents a fast blind signature scheme with extremely low computation for users. Only several modular additions and multiplications are required for a user to obtain and verify a signature in the proposed scheme. Comparing with the existing ones in the literature, the scheme greatly reduces the computations for users. Keywords—Blind signatures, Untraceable electronic cash, Secur...

Journal: :Healthcare quarterly 2007
Sherman Quan Merrick F Zwarenstein Katie N Dainty William J Sibbald Neill K J Adhikari

Newer outpatient electronic prescribing software programs produce typewritten paper prescriptions with electronically created signatures. Current Canadian federal legislation forbids static (unchanging) signature images on prescriptions. We conducted a randomized trial of electronic prescribing in outpatients at a university-affiliated hospital. The application was a wireless Palm-based system ...

Journal: :IACR Cryptology ePrint Archive 2008
Girraj Kumar Verma

A blind signature scheme is a cryptographic primitive in which a user can obtain a signature from the signer without revealing any information about message signature pair. Blind signatures are used in electronic payment systems, electronic voting machines etc. The anonymity of blind signature scheme can be misused by criminals by money laundering or by dubious money. To prevent these crimes, t...

Journal: :international journal of information science and management 0
s. e. adewumi ph. d.management information systems (mis),university of jos e. j. d. garba ph. d., mathematics programme abubakar tafawa balewa university, bauchi

encryption is an important tool for managing and protecting information. cryptography is the only practical means of sending information over an insecure channel. these channels may be computers, telephone lines, satellite, etc. the increasing use of electronic means of data transfer from one point to another, coupled with the growth in networking and internet communication, has extended the ne...

2015
Mohammad Amjad

Now a days digital signature schemes stress on secure, authentication and verification mechanism of electronic signature used in electronic transaction system. In this sequence proxy digital signature may play an important role to achieve the security goals. Proxy Digital signature is the process of authorized signatory of the document by one person on behalf of other one. None of the proxy sig...

2004
Ahmed Patel

Publisher UP GRADE is published on behalf of CEPIS (Council of European Professional Informatics Societies, ) by NOVÁTICA , journal of the Spanish CEPIS society ATI (Asociación de Técnicos de Informática ). UP GRADE is also published in Spanish (full issue printed, some articles online) by NOVÁTICA, and in Italian (abstract...

Journal: :IACR Cryptology ePrint Archive 2007
Shengli Liu Xiaofeng Chen Fangguo Zhang

Restrictive partially blind signature (RPBS) plays an important role in designing secure electronic cash system. Very recently, Wang, Tang and Li proposed a new ID-based restrictive partially blind signature (ID-RPBS) and gave the security proof. In this paper, we present a cryptanalysis of the scheme and show that the signature scheme does not satisfy the property of unforgeability as claimed....

Journal: :European Journal of Law and Technology 2012
Stephen Mason Michael C. Bromby

This is a collaborative submission from a group of academics based in the UK with expertise in information technology law and related areas. The preparation of this response has been funded by the Information Technology Think Tank, which is supported by the Arts and Humanities Research Council and led by the SCRIPT/AHRC Centre for Research in Intellectual Property and Technology, University of ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید