نتایج جستجو برای: signature
تعداد نتایج: 65887 فیلتر نتایج به سال:
Handwritten signature has long been established as the most diffuse mean for personal verification in our daily life. It is commonly, in general, in all kind of legal documents and transactions. Therefore, within all biometric modalities, signature is probably the widest accepted. On the other hand, signature is a behavioural characteristic of individuals, and therefore is considered being weak...
In light of the fact that L2 pronunciation errors are often caused by the transfer of well-established L1 sound systems, this paper examines some of the outstanding phonological differences between Persian and English. Comparing segmental and supra-segmental aspects of both languages, this study also discusses several problematic areas of pronunciation facing Iranian learners of English. To rea...
A proxy signature scheme enables a proxy signer to sign messages on behalf of the original signer. In this paper, we demonstrate that a number of discrete logarithm based proxy signature schemes are vulnerable to an original signer’s forgery attack. In this attack, a malicious original signer can impersonate a proxy signer and produce a forged proxy signature on a message. A third party will in...
Now a days digital signature schemes stress on secure, authentication and verification mechanism of electronic signature used in electronic transaction system. In this sequence proxy digital signature may play an important role to achieve the security goals. Proxy Digital signature is the process of authorized signatory of the document by one person on behalf of other one. None of the proxy sig...
This paper describes a new signature generation method for constructing multi-level signature files to support both relational queries which contain multiple conjunctive (AND) predicates and generic document text queries. We describe the major problems with traditional multi-level signature files and then describe how to build multi-level signature files using a new composite method of parent s...
At ISW’99, Nishioka, Hanaoka and Imai proposed a digital signature scheme on ID-based key-sharing infrastructures. That signature scheme is claimed to be secure if the discrete logarithm problem is hard to solve. Two schemes (the ID-type and the random-type schemes) based on the linear scheme for the Key Predistribution Systems (KPS) and the discrete logarithm problem (DLP) were given. In this ...
A proxy blind signature scheme is combination of two signature schemes particularly proxy signature and blind signature. In this signature scheme the original signer delegate his/her signing authority to some other entity named proxy signer. The proxy signer signs the documents or messages, but he cannot be able to find any link between the blind signature and the identity of the signature requ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید