نتایج جستجو برای: qualifications for secured electronic signature

تعداد نتایج: 10439479  

Journal: :J. Electron. Commerce Res. 2003
Parag Shiralkar Bindiganavale S. Vijayaraman

Applications of digital signature technology are on the rise because of legal and technological developments, along with strong market demand for secured transactions on the Internet. In order to predict the future demand for digital signature products and online security, it is important to understand the application development trends in digital signature technology. This comparative study ac...

Journal: :Journal of Signal and Information Processing 2013

Journal: :IEICE Transactions 2006
Chik How Tan

Recently, Boneh and Boyen proposed a new provably secure short signature scheme under the q-strong Diffie-Hellman assumption without random oracles. This scheme is based on bilinear map which is different from Cramer-Shoup signature scheme (which is based on the strong RSA assumption). However, Tan [17] showed that BonehBoyen scheme is subjected to key substitution attacks in the multi-user set...

Despite the growing growth of technology, handwritten signature has been selected as the first option between biometrics by users. In this paper, a new methodology for offline handwritten signature verification and recognition based on the Shearlet transform and transfer learning is proposed. Since, a large percentage of handwritten signatures are composed of curves and the performance of a sig...

2013

The widespread adoption of Information and Communication Technologies in governance over the years by electronic government has influenced democratic decision making through electronic voting (e-voting).E-voting provides increased participation of populace, reduced cost, decreased cases of invalid votes and support basis of democracy. However, e-voting systems are generally prone to security ri...

2014
SK Hafizul Islam G. P. Biswas

In 2009, Lin et al. proposed a digital multi-signature scheme based on the concepts of generalized conic curves over Zn. They claimed that the multi-signature scheme is well secured and the forgery attack is infeasible on it. Unfortunately, three weaknesses on their proposed multi-signature have been observed and it has been shown that an attacker can compute the secret pairs of all signers usi...

Empowering employees in specialized and general qualifications fields is required for urban management organization (Tehran Municipality). Planning and establishment of comprehensive system of electronic learning is considered the main goal of human resource and educational managers. . This study tried to investigate the feasibility and execution of electronic learning courses for in-service st...

Journal: :RFC 2015
Michael B. Jones John Bradley Nat Sakimura

JSON Web Signature (JWS) is a means of representing content secured with digital signatures or Message Authentication Codes (MACs) using JavaScript Object Notation (JSON) data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification. Related encryption capabilities are described in the separate JSO...

Journal: :JSW 2014
Juntao Gu Xiaodong Zhu

The contract is the bridge to transaction, as well as the core of business practice. Accompanying with the development of electronic commerce, contract negotiation under more complicated environment in advantage of internet is becoming increasingly urgent. This paper briefly introduces the status of electronic signature and electronic contract in China, then presents a reference architecture fo...

Journal: :Digital Evidence and Electronic Signature Law Review 2014

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید