نتایج جستجو برای: qualifications for secured electronic signature

تعداد نتایج: 10439479  

2013
Ajit Kumar Shrivastava

Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of network device compromised with attack and loss of data. For the prevention of attack and reliable communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP (secured backup routing protocol). The process of these methods work along with route discovery ...

Journal: :IAES International Journal of Artificial Intelligence 2021

Insecurity, rigging and violence continue to mar electoral processes in developing nations. It has been difficult enforce security transparency the voting process. This paper proposes a secure automated bimodal system. The system uses three layers, namely, unique ID code, token passcode that expires every five minutes biometrics (iris fingerprint). A scanner captures fingerprint iris of eligibl...

Journal: :International Journal of Advanced Computer Science and Applications 2018

Journal: :Journal of Engineering and Applied Sciences 2012

2017
Dominique Rivard Eric Granger Robert Sabourin Dengsheng Zhang Guojun Lu N. Md Tahir S. Abdul Samad H. Husain R. A. Rahman

Signatures of individuals play an important role in financial, commercial and legal transactions and hence require a secured recognition and verification system. This paper presents a novel approach towards signature recognition using Fourier Descriptors. The signature image is enclosed in a closed contour and the Fourier terms of these contours are computed by representing the contour in a com...

2012
Ashish Vijay

Generally digital signature algorithms are based on a single hard problem like prime factorization problem, discrete logarithm problem, elliptic curve problem. If one finds solution of this single hard problem then these digital signature algorithms will no longer be secured and due to large computational power, this may be possible in future. There are many other algorithms which are based on ...

Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز 1387

امضاء کور یکی از انواع امضاء دیجیتالی است که در آن، امضاء کننده بدون دانستن محتوای اطلاعاتی پیام، اقدام به امضاء آن می کند که محوریت کار این پایان نامه را در بر می گیرد. در این پایان نامه ابتدا به تشریح مبانی رمزنگاری پرداخته، سپس انواع امضاهای دیجیتالی از قبیل ron rivest, adi shamir, leonard ,adleman (rsa)الجمال, (digital signature algorithm) dsa و طرح طبیعی اشنور را تشریح و با هم مقایسه می کن...

2007
Glenn Benson

The financial services industry recognizes the need for advanced security solutions for user identity and transaction processing, while ensuring minimal impact to the online user experience. Users will not accept security controls that encumber the user's daily work. The Portal Security Transaction Protocol (PSTP) is a new signature technology that adds signature semantics to one-time password ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید