Journal articles on the topic 'Identity-based digital signature'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Identity-based digital signature.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Wu, Jian. "Identity-Based Proxy Signcryption Schemes." Applied Mechanics and Materials 380-384 (August 2013): 2605–8. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2605.
Full textDr., G. Charles Babu* Mr. K. Rajeshwar Rao. "IMPROVISATION OF PERFORMANCE IN CLUSTER NETWORKS." Global Journal of Engineering Science and Research Management 3, no. 8 (2016): 87–89. https://doi.org/10.5281/zenodo.61145.
Full textWu, Rui, and Shi Ping Yang. "Application of Identity-Based Blind Signature in the Performance Evaluation." Advanced Materials Research 846-847 (November 2013): 1652–55. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1652.
Full textJames, Salome, Gowri Thumbur, and Vasudeva Reddy P. "Pairing-Free Identity-Based Proxy Signature Scheme With Message Recovery." International Journal of Information Security and Privacy 15, no. 1 (2021): 117–37. http://dx.doi.org/10.4018/ijisp.2021010106.
Full textTurcanu, Dinu, Serghei Popovici, and Tatiana Turcanu. "DIGITAL SIGNATURE: ADVANTAGES, CHALLENGES AND STRATEGIES." Journal of Social Sciences III (4) (December 15, 2020): 62–72. https://doi.org/10.5281/zenodo.4296327.
Full textShen, Xiao Qin, and Yang Ming. "Identity-Based Convertible Limited Verifier Signature Scheme in the Standard Model." Applied Mechanics and Materials 48-49 (February 2011): 599–602. http://dx.doi.org/10.4028/www.scientific.net/amm.48-49.599.
Full textLu, Xiuhua, Qiaoyan Wen, Wei Yin, et al. "Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation." Symmetry 11, no. 2 (2019): 272. http://dx.doi.org/10.3390/sym11020272.
Full textLi, Fengyin, Junhui Wang, Mengxue Shang, Dandan Zhang, and Tao Li. "Research on Quantum-Attack-Resistant Strong Forward-Secure Signature Schemes." Entropy 25, no. 8 (2023): 1159. http://dx.doi.org/10.3390/e25081159.
Full textE.Kamalanaban, Dr, M. Gopinath, and M. Nandhu. "Workflow Signatures for Business Process." International Journal of Engineering & Technology 7, no. 3.34 (2018): 129. http://dx.doi.org/10.14419/ijet.v7i3.34.18788.
Full textZhiming Deng, Dianjun Lu, Teng Chen, and Weixin Yao. "An identity-verifiable quantum threshold group signature scheme based on three-particle GHZ states." Laser Physics 34, no. 5 (2024): 055204. http://dx.doi.org/10.1088/1555-6611/ad3434.
Full textYang, Yifan, Xiaotong Zhou, Binting Su, and Wei Wu. "Efficient Identity-Based Universal Designated Verifier Signature Proof Systems." Mathematics 13, no. 5 (2025): 743. https://doi.org/10.3390/math13050743.
Full textMu, Jian. "Application of Digital Signatures in the Field of E-commerce." Applied and Computational Engineering 117, no. 1 (2025): 198–209. https://doi.org/10.54254/2755-2721/2025.20951.
Full textFiore, Ugo, and Francesco Rossi. "Embedding an Identity-Based Short Signature as a Digital Watermark." Future Internet 7, no. 4 (2015): 393–404. http://dx.doi.org/10.3390/fi7040393.
Full textZhan, Weishu, and XinXin Ye. "Research on Dynamic Identity Authentication Mechanism Based on Digital Signature." Journal of Physics: Conference Series 1693 (December 2020): 012009. http://dx.doi.org/10.1088/1742-6596/1693/1/012009.
Full textKulaga, A. A. "Creation of identity-based digital signature schemes from bilinear maps." Cybernetics and Systems Analysis 48, no. 3 (2012): 452–58. http://dx.doi.org/10.1007/s10559-012-9424-9.
Full textThanalakshmi, P., R. Anitha, N. Anbazhagan, Chulho Park, Gyanendra Prasad Joshi, and Changho Seo. "A Hash-Based Quantum-Resistant Designated Verifier Signature Scheme." Mathematics 10, no. 10 (2022): 1642. http://dx.doi.org/10.3390/math10101642.
Full textJang, Jae Young, Soo Young Jeong, Hyun Il Kim, and Chang Ho Seo. "A Study on Multi-Signature Scheme for Efficient User Authentication in Metaverse." Korean Institute of Smart Media 12, no. 2 (2023): 27–35. http://dx.doi.org/10.30693/smj.2023.12.2.27.
Full textJain, Arpit, Jaspreet Singh, Sandeep Kumar, Țurcanu Florin-Emilian, Mihaltan Traian Candin, and Premkumar Chithaluru. "Improved Recurrent Neural Network Schema for Validating Digital Signatures in VANET." Mathematics 10, no. 20 (2022): 3895. http://dx.doi.org/10.3390/math10203895.
Full textGifia S, Carolin, and Indhumathi S. "Gen AI-Powered Signature Identifier and Image Manipulation." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem44457.
Full textShi, Yang, Jingxuan Han, Jiangfeng Li, Guoyue Xiong, and Qinpei Zhao. "Identity-based undetachable digital signature for mobile agents in electronic commerce." Soft Computing 22, no. 20 (2018): 6921–35. http://dx.doi.org/10.1007/s00500-018-3159-0.
Full textGajewski, Piotr Z., Jerzy Łopatka, and Zbigniew Piotrowski. "New model of identity checking in telecommunication digital channels." Journal of Telecommunications and Information Technology, no. 3 (September 30, 2006): 27–32. http://dx.doi.org/10.26636/jtit.2006.3.382.
Full textZhang, Yingying, Jiwen Zeng, Wei Li, and Huilin Zhu. "A Certificateless Ring Signature Scheme with High Efficiency in the Random Oracle Model." Mathematical Problems in Engineering 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/7696858.
Full textFan, Chun-I., Pei-Hsiu Ho, and Yi-Feng Tseng. "Strongly Secure Certificateless Signature Scheme Supporting Batch Verification." Mathematical Problems in Engineering 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/854135.
Full textZeng, Xu. "The Security Mechanism Research of PACS." Advanced Materials Research 779-780 (September 2013): 1809–12. http://dx.doi.org/10.4028/www.scientific.net/amr.779-780.1809.
Full textMudhafer Taher Al Mossawy, Mais, and Loay E. George. "A digital signature system based on hand geometry - Survey." Wasit Journal of Computer and Mathematics Science 1, no. 1 (2022): 1–14. http://dx.doi.org/10.31185/wjcm.vol1.iss1.18.
Full textAlbasu, F. B., and M. A. Al Akkad. "Exploiting Deep Learning Techniques for the Verification of Handwritten Signatures." Intellekt. Sist. Proizv. 21, no. 3 (2023): 27–39. http://dx.doi.org/10.22213/2410-9304-2023-3-27-39.
Full textKim, Jihwan, Pyung Kim, Daeseon Choi, and Younho Lee. "A Study on the Interoperability Technology of Digital Identification Based on WACI Protocol with Multiparty Distributed Signature." Sensors 23, no. 8 (2023): 4061. http://dx.doi.org/10.3390/s23084061.
Full textHe, Lei, Yong Gan, and Yifeng Yin. "Efficient Threshold Attribute-Based Signature Scheme for Unmanned Aerial Vehicle (UAV) Networks." Electronics 14, no. 2 (2025): 339. https://doi.org/10.3390/electronics14020339.
Full textGoel, Shivani, and Mridul Kumar Gupta. "A Secure and Efficient Attribute-Based Signature Scheme with Proxy Delegation." International Journal of Science and Social Science Research 1, no. 2 (2023): 260–68. https://doi.org/10.5281/zenodo.14970075.
Full textManish, Trikha *. Maitreyee Dutta. "ONLINE SIGNATURE VERIFICATION USING NORMALIZED DYNAMIC FEATURE WITH ARTIFICIAL NEURAL NETWORK CLASSIFICATION." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 9 (2016): 507–13. https://doi.org/10.5281/zenodo.154249.
Full textTan, Liang, Xinglin Shang, Liping Zou, Hekun Yang, Yi Wen, and Zhongzhu Liu. "Multi-party co-signature scheme based on SM2." PLOS ONE 18, no. 2 (2023): e0268245. http://dx.doi.org/10.1371/journal.pone.0268245.
Full textSharma, Gaurav, Suman Bala, and Anil K. Verma. "PF-IBS: Pairing-Free Identity Based Digital Signature Algorithm for Wireless Sensor Networks." Wireless Personal Communications 97, no. 1 (2017): 1185–96. http://dx.doi.org/10.1007/s11277-017-4560-1.
Full textChia, Jason, Ji-Jian Chin, and Sook-Chin Yip. "Digital signature schemes with strong existential unforgeability." F1000Research 10 (September 16, 2021): 931. http://dx.doi.org/10.12688/f1000research.72910.1.
Full textSang, Zixin. "Lattice-Based Traceable Ring Signatures with Range Proofs." Journal of Computer Science and Artificial Intelligence 2, no. 3 (2025): 28–35. https://doi.org/10.54097/ggyc2845.
Full textChen, Jonathan Jen-Rong, Yi-Yuan Chiang, Wang-Hsin Hsu, and Wen-Yen Lin. "Fail-Stop Group Signature Scheme." Security and Communication Networks 2021 (February 8, 2021): 1–6. http://dx.doi.org/10.1155/2021/6693726.
Full textSuganya, R., and Ms A. Divya. "SECURE AND EFFICIENT GRAPH DERIVATION REPRESENTATION APPROACH FOR MEASURING AND DISTRIBUTING CLUSTER BASED ONTOLOGY." Journal of Advance Research in Mathematics And Statistics (ISSN 2208-2409) 2, no. 3 (2015): 01–10. http://dx.doi.org/10.61841/ghfn8p51.
Full textAllvijay, R., and V. M. Sivagami. "Identity based Distributed Data Storage using Digital Signature and Diffie Hellmann Key Exchange Mechanism." International Journal of Computer Applications 94, no. 14 (2014): 27–30. http://dx.doi.org/10.5120/16412-6002.
Full textDimas Kusuma, Vieri. "Proposed Corporate Performance Management Using Knowledge-Based Performance Management System (KBPMS) For Privy." Journal of Economics and Business UBS 13, no. 1 (2024): 296–314. http://dx.doi.org/10.52644/joeb.v13i1.1477.
Full textFan, Desheng, Xiangfeng Meng, Yurong Wang, et al. "Optical identity authentication scheme based on elliptic curve digital signature algorithm and phase retrieval algorithm." Applied Optics 52, no. 23 (2013): 5645. http://dx.doi.org/10.1364/ao.52.005645.
Full textAthena, J., V. Sumathy, and K. Kumar. "An identity attribute-based encryption using elliptic curve digital signature for patient health record maintenance." International Journal of Communication Systems 31, no. 2 (2017): e3439. http://dx.doi.org/10.1002/dac.3439.
Full textYu, Cao. "Research on the Design and Development of Mobil Identity Authentication." Applied Mechanics and Materials 687-691 (November 2014): 1983–86. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1983.
Full textM., Pani Nisha*1 &. R.Vahitha Thangam2. "SECURE AND EFFICIENT DATA TRANSMISSION IN CLUSTER BASED WIRELESS SENSOR NETWORK USING SET-IBS AND SET-IBOOS PROTOCOL." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 8, no. 3 (2019): 235–40. https://doi.org/10.5281/zenodo.2608294.
Full textAhamad, Shaik Shakeel, V. N. Sastry, and Siba K. Udgata. "A Secure Mobile Payment Framework in MANET Environment." International Journal of E-Business Research 9, no. 1 (2013): 54–84. http://dx.doi.org/10.4018/jebr.2013010104.
Full textYuan, Erdong, Liejun Wang, Shuli Cheng, Naixiang Ao, and Qingrui Guo. "A Key Management Scheme Based on Pairing-Free Identity Based Digital Signature Algorithm for Heterogeneous Wireless Sensor Networks." Sensors 20, no. 6 (2020): 1543. http://dx.doi.org/10.3390/s20061543.
Full textDjajadi, Arko, Karunia Suci Lestari, Linda Evan Englista, and Aldi Destaryana. "Blockchain-Based E-Certificate Verification and Validation Automation Architecture to Avoid Counterfeiting of Digital Assets in Order to Accelerate Digital Transformation." CCIT Journal 16, no. 1 (2023): 68–85. http://dx.doi.org/10.33050/ccit.v16i1.2367.
Full textIslam, SK Hafizul, Ashok Kumar Das, and Muhammad Khurram Khan. "Design of a provably secure identity-based digital multi-signature scheme using biometrics and fuzzy extractor." Security and Communication Networks 9, no. 16 (2016): 3229–38. http://dx.doi.org/10.1002/sec.1528.
Full textLin, Baode, Zhenwei Geng, and Fengrong Yu. "Information Security Protection of Internet of Energy Using Ensemble Public Key Algorithm under Big Data." Journal of Electrical and Computer Engineering 2023 (February 17, 2023): 1–10. http://dx.doi.org/10.1155/2023/6853902.
Full textWang, Jun, Feixiang Luo, Zequan Zhou, Xiling Luo, and Zhen Wang. "Optimistic Fair Exchange in Cloud-Assisted Cyber-Physical Systems." Security and Communication Networks 2019 (October 30, 2019): 1–14. http://dx.doi.org/10.1155/2019/5175076.
Full textChen, Jie, and Yue Yu Zhang. "The Scheme of Identity-Based Aggregation Signcryption in Smart Grid." Advanced Materials Research 960-961 (June 2014): 832–35. http://dx.doi.org/10.4028/www.scientific.net/amr.960-961.832.
Full textDharani J, Sundarakantham K, Kunwar Singh, and Mercy Shalinie S. "Design of Anonymous Endorsers in Hyperledger Fabric with Linkable Threshold Ring Signature." Research Briefs on Information and Communication Technology Evolution 6 (October 1, 2020): 41–51. http://dx.doi.org/10.56801/rebicte.v6i.93.
Full text