نتایج جستجو برای: qualifications for secured electronic signature

تعداد نتایج: 10439479  

2011
Isabel Cerqueira Vítor J. Sá Sérgio Tenreiro de Magalhães

This article presents an analysis of the adoption the Citizen Card in Portugal based on a survey, in which 601 citizens participated. The survey focused on the knowledge of the card and of its features, as well as in the digital signature capabilities. First the survey population was informed about the concept of the Citizen Card, its applicability, and the technological mechanisms associated w...

2016
J.Nandhini D.Sharmila

Route identification and digital signature has been considered in Mobile Ad hoc NETwork (MANET) for efficient message broadcasting. The integrity and authenticity through acknowledgement packets, forged acknowledgment attack is not possible due to dynamic traffics. In addition, the route identification usually filters out newly observed polluted nodes through digital signature scheme. Thus, the...

2004
Constantin Popescu

Maitland and Boyd proposed at ICICS 2001 an offline electronic cash system based on the group signature scheme. Their scheme cannot be used to solve blackmailing and other anonymity problems such as money laundering and illegal purchases. In this paper we extend the electronic cash system of Maitland and Boyd to prevent blackmailing, money laundering and illegal purchases by using a secure coal...

Journal: :CoRR 2006
Christian Hett Nicolai Kuntze Andreas U. Schmidt

An efficient archive securing the integrity of VoIP-based two-party conversations is presented. The solution is based on chains of hashes and continuously chained electronic signatures. Security is concentrated in a single, efficient component, allowing for a detailed analysis.

Journal: :Internet Research 2001
Martha A. Broderick Virginia R. Gibson Peter Tarasewich

In the United States, electronic signatures recently became as legally binding as printed signatures. But the legislation that made electronic signatures legal did nothing to specify how they should be implemented, or what precautions must be taken to ensure the security and validity of the signature process. This paper first reviews the status of electronic signatures in the United States, and...

1996
David Pointcheval Jacques Stern

In this paper, we give a provably secure design for blind signatures, the most important ingredient for anonymity in off-line electronic cash systems. Previous examples of blind signature schemes were constructed from traditional signature schemes with only the additional proof of blindness. The design of some of the underlying signature schemes can be validated by a proof in the so-called rand...

2014
Gurdeep Kaur Parminder Singh

Iris recognition has been done by many researchers in last decade. Iris recognition plays an important role to improve efficiency in biometric identification due to its reliability in highly secured areas. Such as In Airports And Harbors, Access Control In Laboratories And Factories traditional issue is focused on full fingerprint images matching and face detection are used for identification o...

2002
Roger Kilian-Kehr Joachim Posegga

We present approaches to raise the security level in the process of electronic signature creation by shifting as many tasks as possible involved in digitally signing data into a tamper-resistant and trustworthy smart card. We describe the fundamental technical principles our approach is based on, illustrate resulting design options, and compare the security of our approach with traditional elec...

Journal: :IJCNDS 2014
Fuw-Yi Yang Ling-Ren Liang Chun-Chin Hsu

Designated verifier signature schemes are applied in situations such as electronic voting and electronic auctions. Signature recipients can ascertain the contents of the document, but cannot verify the identity of the signer to a third party. This study reviewed the protocols of past researches and analyzed whether these protocols would disclose signer identities under various types of attacks....

2009
Nikhil Handigol Te-Yuan Huang Gene Chi Liu

Signatures are a popular means of authentication. They, ideally, are unique to a person and, therefore, hard to copy. Two common types of signatures are traditional “pen-on-paper” signatures and electronic signatures. Electronic signatures are done on a custom-built electronic board using a stylus. The electronic board records information such as pressure, acceleration, and angle of the stylus ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید