Journal articles on the topic 'Digital Signature Algorithm confidentiality'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Digital Signature Algorithm confidentiality.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Dhanashree, Toradmalle, Muthukuru Jayabhaskar, and Sathyanarayana B. "Certificateless and provably-secure digital signature scheme based on elliptic curve." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 4 (2019): 3228–31. https://doi.org/10.11591/ijece.v9i4.pp3228-3231.
Full textToradmalle, Dhanashree, Jayabhaskar Muthukuru, and B. Sathyanarayana. "Certificateless and provably-secure digital signature scheme based on elliptic curve." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 4 (2019): 3228. http://dx.doi.org/10.11591/ijece.v9i4.pp3228-3231.
Full textOctora Ginting, Ferraro S., Veithzal Rivai Zainal, and Aziz Hakim. "Digital Signature Standard Implementation Strategy by Optimizing Hash Functions Through Performance Optimization." Journal of Accounting and Finance Management 3, no. 6 (2023): 362–71. http://dx.doi.org/10.38035/jafm.v3i6.175.
Full textHoang, Sy Tuong, Quang Trung Do, and Nhu Quynh Luc. "Build a Blockchain-based confidentiality and privacy solution using cryptographic techniques." Ministry of Science and Technology, Vietnam 65, no. 3 (2023): 1–6. http://dx.doi.org/10.31276/vjst.65(3).01-06.
Full textNadzifarin, Aulia, and Asmunin Asmunin. "Penerapan Elliptic Curve Digital Signature Algorithm pada Tanda Tangan Digital dengan Studi Kasus Dokumen Surat – Menyurat." Journal of Informatics and Computer Science (JINACS) 4, no. 01 (2022): 1–9. http://dx.doi.org/10.26740/jinacs.v4n01.p1-9.
Full textIndah Lestari, Rahayu, Vera Suryani, and Aulia Arif Wardhana. "Digital Signature Method to Overcome Sniffing Attacks on LoRaWAN Network." International journal of electrical and computer engineering systems 13, no. 7 (2022): 533–39. http://dx.doi.org/10.32985/ijeces.13.7.5.
Full textMUSTAFA, HUSSEIN, ELHADY MAHMOUD ABD, HAMDY SARA, and ALSOBKY WAGEDA. "DESIGNING NEW TECHNIQUE IN DIGITAL SIGNATURE BASED ON GALOIS FIELD 2n AND CHAOTIC MAPS." Seybold Report Journal 18, no. 09 (2023): 53–72. https://doi.org/10.5281/zenodo.8344314.
Full textPaulus, Erick, and Mochamad Azmi Fauzan. "A Framework to Ensure Data Integrity and Safety." Data Science: Journal of Computing and Applied Informatics 2, no. 1 (2018): 1–11. http://dx.doi.org/10.32734/jocai.v2.i1-90.
Full textSun, Feifei, and Guohong Shi. "Application Research in Computer Vision Signature Encryption System of Enterprise Contract Economic Management." Wireless Communications and Mobile Computing 2022 (May 13, 2022): 1–5. http://dx.doi.org/10.1155/2022/9677942.
Full textSihombing, Grace Lamudur Arta. "HYBRID CHRIPTOGRAPHY STREAM CIPHER AND RSA ALGORITHM WITH DIGITAL SIGNATURE AS A KEY." InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan) 1, no. 2 (2017): 75–83. http://dx.doi.org/10.30743/infotekjar.v1i2.66.
Full textKumar, Pankaj, Saurabh Kumar Sharma, and Kaveri Umesh Kadam. "Empirical Evaluation of ECC Batch Verification Algorithms of Digital Signature in Wireless Sensor Network." Electronics ETF 26, no. 2 (2022): 53–64. http://dx.doi.org/10.53314/els2226053k.
Full textNuraeni, Fitri, Dede Kurniadi, and Diva Nuratnika Rahayu. "IMPLEMENTATION OF RSA AND AES-128 SUPER ENCRYPTION ON QR-CODE BASED DIGITAL SIGNATURE SCHEMES FOR DOCUMENT LEGALIZATION." Jurnal Teknik Informatika (Jutif) 5, no. 3 (2024): 675–84. https://doi.org/10.52436/1.jutif.2024.5.3.1426.
Full textSusilawati Mohamad, Fatma, Fadi Mohammad Alsuhimat, Mohamad Afendee Mohamed, Mumtazimah Mohamad, and Azrul Amri Jamal. "Detection and Feature Extraction for Images Signatures." International Journal of Engineering & Technology 7, no. 3.28 (2018): 44. http://dx.doi.org/10.14419/ijet.v7i3.28.20963.
Full textYusuf, Hasril, Afriyudi Afriyudi, and Hadi Syaputra. "Digital Signature Pada Citra Digital Menggunakan Algoritma Rc6 Studi Kasus: Dokumen Kartu Keluarga." Journal of Computer and Information Systems Ampera 1, no. 1 (2020): 44–52. http://dx.doi.org/10.51519/journalcisa.v1i1.4.
Full textDavid, Shibin, and G. Jaspher W. Kathrine. "Digital Signature Algorithm for M-Payment Applications Using Arithmetic Encoding and Factorization Algorithm." Journal of Cases on Information Technology 23, no. 3 (2021): 11–26. http://dx.doi.org/10.4018/jcit.20210701.oa2.
Full textLin, Baode, Zhenwei Geng, and Fengrong Yu. "Information Security Protection of Internet of Energy Using Ensemble Public Key Algorithm under Big Data." Journal of Electrical and Computer Engineering 2023 (February 17, 2023): 1–10. http://dx.doi.org/10.1155/2023/6853902.
Full textHendry Leo Kanickam, S., and L. Jayasimman. "Comparative Analysis of Hash Authentication Algorithms and ECC Based Security Algorithms in Cloud Data." Asian Journal of Computer Science and Technology 8, no. 1 (2019): 53–61. http://dx.doi.org/10.51983/ajcst-2019.8.1.2118.
Full textPenubadi, Harshavardhan Reddy, Pritesh Shah, Ravi Sekhar, et al. "Sustainable electronic document security: a comprehensive framework integrating encryption, digital signature and watermarking algorithms." Heritage and Sustainable Development 5, no. 2 (2023): 391–404. http://dx.doi.org/10.37868/hsd.v5i2.359.
Full textChen, Zao. "Federated Learning based on Homomorphic Encryption and Digital Signatures." Highlights in Science, Engineering and Technology 39 (April 1, 2023): 595–603. http://dx.doi.org/10.54097/hset.v39i.6596.
Full textDevendra, Dandekar Pranjali Dandekar Rohanak Pawar Nikhil Kamble Sandip Patil. "Document Verification System in Blockchain Technique by using Hash & Digital Signature Algorithm." International Journal of Advanced Innovative Technology in Engineering 10, no. 2 (2025): 145–52. https://doi.org/10.5281/zenodo.15423140.
Full textMark Espalmado, John, and Edwin Arboleda. "DARE Algorithm: A New Security Protocol by Integration of Different Cryptographic Techniques." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 2 (2017): 1032. http://dx.doi.org/10.11591/ijece.v7i2.pp1032-1041.
Full textJean Pierre Ntayagabiri, Jeremie Ndikumagenge, Youssef Bentaleb, and Hind El Makhtoum. "Comparative Analysis of Elliptic Curve-Based Cryptographic Approaches for Internet of Things Security." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 1077–92. https://doi.org/10.32628/cseit2410457.
Full textJohn, Mark B. Espalmado, and R. Arboleda Edwin. "DARE Algorithm: A New Security Protocol by Integration of Different Cryptographic Techniques." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 2 (2017): 1032–41. https://doi.org/10.11591/ijece.v7i2.pp1032-1041.
Full textЛАВРИК, ІВАН. "ДОСЛІДЖЕННЯ АЛГОРИТМІВ ПОСТКВАНТОВОГО ЦИФРОВОГО ПІДПИСУ". Herald of Khmelnytskyi National University. Technical sciences 333, № 2 (2024): 361–69. http://dx.doi.org/10.31891/2307-5732-2024-333-2-56.
Full textDr.Yakubu, Ajiji Maker. "The Importance of Cryptography in Digital Signatures." International Journal of Information Technology 3, no. 8 (2020): 1–12. https://doi.org/10.5281/zenodo.3685178.
Full textRushda, Naushad Dakhni, and I. Sandilkar Saniya. "Implementation of RSA Algorithm for Encryption and Decryption Recent Technology Trends in Computer Technology." International Journal of Advanced Research in Science, Communication and Technology (IJARSCT) 3, no. 19 (2023): 66–70. https://doi.org/10.5281/zenodo.8133459.
Full textSadikin, Mohamad Ali, and Rini Wisnu Wardhani. "Implementation of RSA 2048-bit and AES 256-bit with Digital Signature for Secure Electronic Health Record Application." CommIT (Communication and Information Technology) Journal 10, no. 2 (2016): 63. http://dx.doi.org/10.21512/commit.v10i2.1549.
Full textPatil, Girish, Kartik Nillawar, Mohit Khatri, Sachin Shetkar, and Snehal Shinde. "Smart Way for Prescribing Medication." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 6795–800. http://dx.doi.org/10.22214/ijraset.2023.53317.
Full textGour, Ayush, Simarjit Singh Malhi, Gursharan Singh, and Gursimran Kaur. "Hybrid Cryptographic Approach: For Secure Data Communication using Block Cipher Techniques." E3S Web of Conferences 556 (2024): 01048. http://dx.doi.org/10.1051/e3sconf/202455601048.
Full textSharma, Arvind K., and Sudesh K. Mittal. "Cryptographic Keyed Hash Function: PARAŚU-256." Journal of Computational and Theoretical Nanoscience 17, no. 11 (2020): 5072–84. http://dx.doi.org/10.1166/jctn.2020.9343.
Full textBourair, Bourair, Noora zidan .., Bourair Al Al-Attar, Hussein A. Hussein Al Naffakh, and J. F. F.Tawfeq. "Implementation of novel cryptographic technique for enhancing the cipher security for Resilient Infrastructure." Fusion: Practice and Applications 15, no. 1 (2024): 32–44. http://dx.doi.org/10.54216/fpa.150103.
Full textHouari, Nawal Sad, Fatima Kabli, and Affaf Matoug. "Integration of IMEI, RSA, and Signature to Secure Communication in Mobile Applications." International Journal of Organizational and Collective Intelligence 12, no. 1 (2022): 1–18. http://dx.doi.org/10.4018/ijoci.306979.
Full textKhalid, Zhwan Mohammed, and Shavan Askar. "Resistant Blockchain Cryptography to Quantum Computing Attacks." International Journal of Science and Business 5, no. 3 (2021): 116–25. https://doi.org/10.5281/zenodo.4497732.
Full textHarsh Verma. "Hybrid Data Integrity Verification for Real-Time IoT Systems Using AEAD and VRF with ECDSA." Journal of Information Systems Engineering and Management 10, no. 34s (2025): 855–67. https://doi.org/10.52783/jisem.v10i34s.5875.
Full textSatrasupalli, Sivaji, and S. Vishnu. "An Encryption Algorithm for Enhanced Image Security." International Journal of Engineering and Advanced Technology 9, no. 1s5 (2019): 81–84. http://dx.doi.org/10.35940/ijeat.a1020.1291s519.
Full textTsai, Chwei-Shyong, Hsin-Liang Chen, Hsien-Chu Wu, and Josh Jia-Ching Ying. "A Puzzle-Based Data Sharing Approach with Cheating Prevention Using QR Code." Symmetry 13, no. 10 (2021): 1896. http://dx.doi.org/10.3390/sym13101896.
Full textJ., Williams,, Bennett, E. O., and Anireh, V.I.E. "An efficient algorithm for text encryption on android devices." International Journal of Engineering and Computer Science 13, no. 07 (2024): 26229–35. http://dx.doi.org/10.18535/ijecs/v13i07.4843.
Full textEsh Narayan. "Cryptography Security of Digital Signals using Golden Matrix with Recurrence Relations." Journal of Information Systems Engineering and Management 10, no. 14s (2025): 845–56. https://doi.org/10.52783/jisem.v10i14s.2400.
Full textAkanksha, Tomar* Jamwant Kumbhre. "SURVEY ON CLOUD SECURITY BY DATA ENCRYPTION USING ELLIPTIC CURVE CRYPTOGRAPHY." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 12 (2016): 992–97. https://doi.org/10.5281/zenodo.225383.
Full textVENKATESWARAN, N. "A SECURE BLOCKCHAIN FRAMEWORK FOR COLLABORATIVE SERVICE." International Scientific Journal of Engineering and Management 04, no. 06 (2025): 1–9. https://doi.org/10.55041/isjem04609.
Full textAlShalaan, Manal Rajeh, and Suliman Mohamed Fati. "Enhancing Organizational Data Security on Employee-Connected Devices Using BYOD Policy." Information 14, no. 5 (2023): 275. http://dx.doi.org/10.3390/info14050275.
Full textShaaban, Mohamed Ali, Almohammady S. Alsharkawy, Mohammad T. AbouKreisha, and Mohammed Abdel Razek. "Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment." International journal of Computer Networks & Communications 15, no. 04 (2023): 55–71. http://dx.doi.org/10.5121/ijcnc.2023.15404.
Full textVS, Barath. "Secured Folder Encryption and Decryption." International Journal for Research in Applied Science and Engineering Technology 12, no. 11 (2024): 121–29. http://dx.doi.org/10.22214/ijraset.2024.64953.
Full textPrasad, V. Hari, Mohammed Rafi, Mohammad Khaleel Ahmed, Ashraf Ben Miled, and Mahammad Shabana. "Random Self-Generative Schnorr Certificate less Signcryption for Secure Data Sharing in Mobile Cloud Environments." WSEAS TRANSACTIONS ON COMPUTER RESEARCH 13 (April 10, 2025): 270–80. https://doi.org/10.37394/232018.2025.13.25.
Full textKim, Dohoon, Sang Seo, Heesang Kim, Won Gi Lim, and Youn Kyu Lee. "A Study on the Concept of Using Efficient Lightweight Hash Chain to Improve Authentication in VMF Military Standard." Applied Sciences 10, no. 24 (2020): 8999. http://dx.doi.org/10.3390/app10248999.
Full textHafeez, Muhammad Asfand, Kazi Hassan Shakib, and Arslan Munir. "A Secure and Scalable Authentication and Communication Protocol for Smart Grids." Journal of Cybersecurity and Privacy 5, no. 2 (2025): 11. https://doi.org/10.3390/jcp5020011.
Full textNurcahya, Saputra Dwi, Dian Nazelliana, and Purwanti . "Implementasi Algoritma Kriptografi Chiper Simetris Menggunakan Bahasa Pemrograman PHP." Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) 8, no. 2 (2025): 1084–89. https://doi.org/10.32672/jnkti.v8i2.8989.
Full textBenmenzer, Faiza, and Rachid Beghdad. "Combining Elliptic Curve Cryptography and Blockchain Technology to Secure Data Storage in Cloud Environments." International Journal of Information Security and Privacy 16, no. 1 (2022): 1–20. http://dx.doi.org/10.4018/ijisp.307072.
Full textChen, Jiaoyue, Qihui Zuo, Wenquan Jin, Yujing Wu, Yihu Xu, and Yinan Xu. "Study of Network Security Based on Key Management System for In-Vehicle Ethernet." Electronics 13, no. 13 (2024): 2524. http://dx.doi.org/10.3390/electronics13132524.
Full textAmbareen, Javeria, M. Prabhakar, and Tabassum Ara. "LEES: a Hybrid Lightweight Elliptic ElGamal-Schnorr-Based Cryptography for Secure D2D Communications." Journal of Telecommunications and Information Technology 2 (March 30, 2021): 24–30. http://dx.doi.org/10.26636/jtit.2021.146020.
Full text