نتایج جستجو برای: qualifications for secured electronic signature
تعداد نتایج: 10439479 فیلتر نتایج به سال:
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of network device compromised with attack and loss of data. For the prevention of attack and reliable communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP (secured backup routing protocol). The process of these methods work along with route discovery ...
Insecurity, rigging and violence continue to mar electoral processes in developing nations. It has been difficult enforce security transparency the voting process. This paper proposes a secure automated bimodal system. The system uses three layers, namely, unique ID code, token passcode that expires every five minutes biometrics (iris fingerprint). A scanner captures fingerprint iris of eligibl...
Signatures of individuals play an important role in financial, commercial and legal transactions and hence require a secured recognition and verification system. This paper presents a novel approach towards signature recognition using Fourier Descriptors. The signature image is enclosed in a closed contour and the Fourier terms of these contours are computed by representing the contour in a com...
Generally digital signature algorithms are based on a single hard problem like prime factorization problem, discrete logarithm problem, elliptic curve problem. If one finds solution of this single hard problem then these digital signature algorithms will no longer be secured and due to large computational power, this may be possible in future. There are many other algorithms which are based on ...
Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...
امضاء کور یکی از انواع امضاء دیجیتالی است که در آن، امضاء کننده بدون دانستن محتوای اطلاعاتی پیام، اقدام به امضاء آن می کند که محوریت کار این پایان نامه را در بر می گیرد. در این پایان نامه ابتدا به تشریح مبانی رمزنگاری پرداخته، سپس انواع امضاهای دیجیتالی از قبیل ron rivest, adi shamir, leonard ,adleman (rsa)الجمال, (digital signature algorithm) dsa و طرح طبیعی اشنور را تشریح و با هم مقایسه می کن...
The financial services industry recognizes the need for advanced security solutions for user identity and transaction processing, while ensuring minimal impact to the online user experience. Users will not accept security controls that encumber the user's daily work. The Portal Security Transaction Protocol (PSTP) is a new signature technology that adds signature semantics to one-time password ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید