Academic literature on the topic 'Signature Authentication'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Signature Authentication.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Signature Authentication"

1

PU, Guangning, and Fengmei YIN. "An Anonymous Authentication Scheme with Selective Linkability and Threshold Traceability." Wuhan University Journal of Natural Sciences 28, no. 4 (2023): 317–23. http://dx.doi.org/10.1051/wujns/2023284317.

Full text
Abstract:
In order to protect the user's privacy identity, authentication requires anonymous authentication. Anonymous authentication is divided into unconditional anonymous authentication and traceable anonymous authentication. Unconditional anonymous authentication can verify that the user belongs to an anonymous set, but the user's true identity cannot be obtained. However, in some applications, it is necessary to trace the true identity of the user. Therefore, a traceable anonymous authentication scheme is proposed. In order to prevent random tracing, the proposed scheme uses threshold joint tracing
APA, Harvard, Vancouver, ISO, and other styles
2

Mohd Taib Wahid, Mohd Taib Wahid. "Enhancement of DTW Algorithm in on-Line Signature Mapping Using the Lost-Box Recovery Algorithm." journal of king abdulaziz university computing and information technology sciences 1, no. 2 (2012): 105–22. http://dx.doi.org/10.4197/comp.1-2.5.

Full text
Abstract:
Signature is a common practice as a way of identifies authentication or verification. Signature On-line validation and authentication is a field of authenticating the time series signature data which is generally acquired from the tablet-based device. Different from common traditional signature image, the on-line signature image data contain number of points that are arranged in sequence of time. The aim of this research is to enhance existing approach to map the strokes in both test and reference signatures. Current methods make use of the DTW (Dynamic Time Warping) algorithm and its deviate
APA, Harvard, Vancouver, ISO, and other styles
3

Dr., Praveen Kumar K. V., Kumar Mandal Pramit, Anand Rishav, Singh Sakshee, and Choskit Tsewang. "Signature Forgery Detection." International Journal of Innovative Science and Research Technology (IJISRT) 9, no. 3 (2024): 6. https://doi.org/10.5281/zenodo.10793129.

Full text
Abstract:
The usage of advanced signature verification technologies is required because of the growing dependence on digital transactions and authentication technology. This survey looks at the current state of dynamic signature representation techniques, with a focus on learning without forgeries. The efficacy of enhancing the security of signature-based authentication systems through the combination of 1D CNNs and the novel signature embedding approach Synsig2Vec is assessed. The survey's first section addresses the dangers of forgery attacks and the weaknesses of employing traditional signature verif
APA, Harvard, Vancouver, ISO, and other styles
4

Huang, Juanjuan, Yuhang Xue, and Linhui Liu. "Dynamic Signature Verification Technique for the Online and Offline Representation of Electronic Signatures in Biometric Systems." Processes 11, no. 1 (2023): 190. http://dx.doi.org/10.3390/pr11010190.

Full text
Abstract:
Biometric systems input physical or personal human characteristics for identification, authentication, and security purposes. With the advancement in communication and intelligent security systems, biometrics are programmed to validate electronic signatures (E-signatures) for online and offline authentication. This article introduces a dynamic signature verification technique (DSVT) using mutual compliance (MC) between the security system and the biometric device. The security system is responsible for online and offline signature approval using personal inputs from humans. This personal verif
APA, Harvard, Vancouver, ISO, and other styles
5

Nista, Elizabeth. "Signature Authentication." Biology of Blood and Marrow Transplantation 19, no. 2 (2013): S170. http://dx.doi.org/10.1016/j.bbmt.2012.11.144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Farida, Yeni, Arsya Dyani Azzahra, Andriani Adi Lestari, Sepha Siswantyo, Annisa Dini Handayani, and Dimas Febriyan Priambodo. "A Security Enhancement to The Secure Mutual Authentication Protocol for Fog/Edge." Jurnal Nasional Pendidikan Teknik Informatika (JANAPATI) 14, no. 1 (2025): 73–80. https://doi.org/10.23887/janapati.v14i1.84725.

Full text
Abstract:
A secured mutual authentication protocol (SMAP Fog/Edge) has been developed for fog computing. The protocol provides secure mutual authentication which lightweight and efficient for fog computing environments. However, based on AVISPA’s verification from Azzahra research, this protocol has been found to be vulnerable to man-in-the-middle (MITM) attacks due to the absence of an authentication scheme between authentication server and the edge user. The attacks are carried out assuming that the public key of the fog server is not distributed over a secure channel. Rhim research and Lestari resear
APA, Harvard, Vancouver, ISO, and other styles
7

Jang, Jae Young, Soo Young Jeong, Hyun Il Kim, and Chang Ho Seo. "A Study on Multi-Signature Scheme for Efficient User Authentication in Metaverse." Korean Institute of Smart Media 12, no. 2 (2023): 27–35. http://dx.doi.org/10.30693/smj.2023.12.2.27.

Full text
Abstract:
Currently, online user authentication is perform using joint certificates issued by accredited certification authorities and simple certificates issued by private agency. In such a PKI(Public Key Infrastructure) system, various cryptographic technologies are used, and in particular, digital signatures are used as a core technology. The digital signature scheme is equally used in DID(Decentralized Identity), which is attracting attention to replace the existing centralized system. As such, the digital signature-based user authentication used in current online services is also applied in the met
APA, Harvard, Vancouver, ISO, and other styles
8

R. Saleh, Shaymaa, Zamen F. Jabr, and Abeer N. Fasial. "A Hybrid Features for Signature Recognition Using Neural Network." University of Thi-Qar Journal of Science 6, no. 1 (2016): 83–89. http://dx.doi.org/10.32792/utq/utjsci/v6i1.52.

Full text
Abstract:
In automatic personal recognition systems, biometric features is used as recognition measure based on biological traits such as face, iris, fingerprint, etc…or gait, signature which is considered behavioral characteristics. Signature verification is one of the authentication methods which can provide security at maintenance and low cost. The most essential and challenging stage of any off-line signature system is feature extraction stage. The accuracy and robust of the recognition system depends basically on the usefulness of the signature features extracted by this system. If the extracted fe
APA, Harvard, Vancouver, ISO, and other styles
9

Mosaher, Quazi Saad-ul, and Mousumi Hasan. "Offline Handwritten Signature Recognition Using Deep Convolution Neural Network." European Journal of Engineering and Technology Research 7, no. 4 (2022): 44–47. http://dx.doi.org/10.24018/ejeng.2022.7.4.2851.

Full text
Abstract:
In the modern age, technological advancement reached a new limit where authentication plays a vital role in security management. Biometric-based authentication is the most referenced procedure for authentication where signature verification is a significant part of it for authentication of a person. To prevent the falsification of signatures on important documents & legal transactions it is necessary to recognize a person's signature accurately. This paper focused on recognizing offline handwritten original & forged signatures using a deep convolution neural network. We use a completel
APA, Harvard, Vancouver, ISO, and other styles
10

Oida, Kazumasa. "Uniqueness and Reproducibility of Traffic Signatures." Journal of Telecommunications and Information Technology, no. 4 (December 30, 2015): 44–53. http://dx.doi.org/10.26636/jtit.2015.4.984.

Full text
Abstract:
Usable user authentication is an important research topic. The traffic signature-based approach is a new authentication technology that identifies the devices used by online users based on traffic signatures, where the traffic signature is a statistic of the video stream delivered by the authentication server to the user device. This approach has two advantages. First, users need not do any operations regarding the device identification. Second, users need not be sensitive to the privacy loss and computer theft. In this paper, an author evaluates the uniqueness and reproducibility of the signa
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Signature Authentication"

1

Chandrasekhar, Santosh. "CONSTRUCTION OF EFFICIENT AUTHENTICATION SCHEMES USING TRAPDOOR HASH FUNCTIONS." UKnowledge, 2011. http://uknowledge.uky.edu/gradschool_diss/162.

Full text
Abstract:
In large-scale distributed systems, where adversarial attacks can have widespread impact, authentication provides protection from threats involving impersonation of entities and tampering of data. Practical solutions to authentication problems in distributed systems must meet specific constraints of the target system, and provide a reasonable balance between security and cost. The goal of this dissertation is to address the problem of building practical and efficient authentication mechanisms to secure distributed applications. This dissertation presents techniques to construct efficient digit
APA, Harvard, Vancouver, ISO, and other styles
2

Guzman, Tamayo Ana M. "Thermal Imaging As A Biometrics Approach To Facial Signature Authentication." FIU Digital Commons, 2011. http://digitalcommons.fiu.edu/etd/539.

Full text
Abstract:
This dissertation develops an image processing framework with unique feature extraction and similarity measurements for human face recognition in the mid-wave infrared portion of the electromagnetic spectrum. The goal is to design specialized algorithms that would extract vasculature information, create a thermal facial signature and identify the individual. The objective is to use such findings in support of a biometrics system for human identification with a high degree of accuracy and a high degree of reliability. This last assertion is due to the minimal to no risk for potential alteration
APA, Harvard, Vancouver, ISO, and other styles
3

Yu, Ping. "Direct Online/Offline Digital Signature Schemes." Thesis, University of North Texas, 2008. https://digital.library.unt.edu/ark:/67531/metadc9717/.

Full text
Abstract:
Online/offline signature schemes are useful in many situations, and two such scenarios are considered in this dissertation: bursty server authentication and embedded device authentication. In this dissertation, new techniques for online/offline signing are introduced, those are applied in a variety of ways for creating online/offline signature schemes, and five different online/offline signature schemes that are proved secure under a variety of models and assumptions are proposed. Two of the proposed five schemes have the best offline or best online performance of any currently known technique
APA, Harvard, Vancouver, ISO, and other styles
4

Ge, He. "Flexible Digital Authentication Techniques." Thesis, University of North Texas, 2006. https://digital.library.unt.edu/ark:/67531/metadc5277/.

Full text
Abstract:
Abstract This dissertation investigates authentication techniques in some emerging areas. Specifically, authentication schemes have been proposed that are well-suited for embedded systems, and privacy-respecting pay Web sites. With embedded systems, a person could own several devices which are capable of communication and interaction, but these devices use embedded processors whose computational capabilities are limited as compared to desktop computers. Examples of this scenario include entertainment devices or appliances owned by a consumer, multiple control and sensor systems in an automobil
APA, Harvard, Vancouver, ISO, and other styles
5

Chakrabarti, Saikat. "EFFICIENT AND SCALABLE NETWORK SECURITY PROTOCOLS BASED ON LFSR SEQUENCES." UKnowledge, 2008. http://uknowledge.uky.edu/gradschool_diss/640.

Full text
Abstract:
The gap between abstract, mathematics-oriented research in cryptography and the engineering approach of designing practical, network security protocols is widening. Network researchers experiment with well-known cryptographic protocols suitable for different network models. On the other hand, researchers inclined toward theory often design cryptographic schemes without considering the practical network constraints. The goal of this dissertation is to address problems in these two challenging areas: building bridges between practical network security protocols and theoretical cryptography. This
APA, Harvard, Vancouver, ISO, and other styles
6

Qiang, Huang, and Yang Fan. "Study on Telemetry Data Authentication Protocol in Arms Control Verification." International Foundation for Telemetering, 1999. http://hdl.handle.net/10150/608729.

Full text
Abstract:
International Telemetering Conference Proceedings / October 25-28, 1999 / Riviera Hotel and Convention Center, Las Vegas, Nevada<br>The arms control verification activity is executed between countries, so various telemetry data will be remote-transmitted in the public signal channel and can be easily tampered. In order to secure this data’s authenticity and integrality, the paper has established a Multi-layer Data Authentication Protocol (MDAP) in which the key cryptographic technologies are digital signature and authentication. Meanwhile, overall evaluations of MDAP have been presented. We pr
APA, Harvard, Vancouver, ISO, and other styles
7

Галушка, Олександр Сергійович, та Oleksandr Galushka. "Інформаційна система аутентифікації людини за її динамічним підписом". Thesis, Тернопільський національний технічний університет імені Івана Пулюя, 2013. http://elartu.tntu.edu.ua/handle/123456789/2710.

Full text
Abstract:
Обґрунтовано використання нового методу прийняття рішень на основі стохастичної моделі динамічного підпису з використанням коефіцієнтів ортогонального перетворення як аутентифікаційних ознак.<br>The aim of work is to develop theoretical and based on probabilistic approach, mathematical models, methods of dynamic signatures and methods of decision- making for individual authentication tasks in information systems. Substantiated usage of a new method of decision-making based on a stochastic model of the on-line signature using orthogonal transformation coefficients as authentication attribu
APA, Harvard, Vancouver, ISO, and other styles
8

Thangavel, Jayakumar. "Digital Signature : Comparative study of its usage in developed and developing countries." Thesis, Uppsala universitet, Informationssystem, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-217960.

Full text
Abstract:
The online trading is growing widely day by day, which makes safety the biggest concern while carrying out trading by electronic means. As many other operations can be done with digital environment and internet, operation that provides identity validation should also be added to the digital environment. When data are transferred, the user should make sure that there are no changes in the original data while transferring them from sender to receiver. And it has also become necessary to authenticate the users often to ensure security and to avoid fraud. There are lot of different ways of online
APA, Harvard, Vancouver, ISO, and other styles
9

Sarıer, Deniz Neyire [Verfasser]. "Biometric Cryptosystems : Authentication, Encryption and Signature for Biometric Identities [[Elektronische Ressource]] / Neyire Deniz Sarıer." Bonn : Universitäts- und Landesbibliothek Bonn, 2013. http://d-nb.info/1044870044/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Al-Fayoumi, Mustafa Ahmad. "Security performance analysis and enhancement of wireless authentication protocol based on digital signature scheme." Thesis, Anglia Ruskin University, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.490718.

Full text
Abstract:
One of the most challenging problems introduced by mobile networking is security. Therefore, a secure and efficient authentication mechanism is especially needed for mobile communication systems. The authentication protocol incurs overheads on the transmission process. These overheads affect the mobile network performance such as delay and bandwidth.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Signature Authentication"

1

Aalberts, Babette. Digital signature blindness: Analysis of legislative approaches toward electronic authentication. Kluwer, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

United, States Congress Senate Committee on Banking Housing and Urban Affairs Subcommittee on Financial Services and Technology. Electronic authentication and digital signature: Hearing before the Subcommittee on Financial Services and Technology of the Committee on Banking, Housing, and Urban Affairs, United States Senate, One Hundred Fifth Congress, first session ... October 28, 1997. U.S. G.P.O., 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

1963-, Langenbach C. J., and Ulrich Otto 1942-, eds. Elektronische Signaturen: Kulturelle Rahmenbedingungen einer technischen Entwicklung. Springer, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Viesca, Ma Isabel Huerta. Los prestadores de servicios de certificación en la contratación electrónica. Aranzadi Editorial, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Krafft, Alfredo Alejandro Reyes. La firma electrónica y las entidades de certificación. Editorial Porrúa, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Biblioteca del Congreso Nacional (Chile). Ley 19.799: Sobre documentos electronicos, firma electronica y servicios de certificación de dicha firma. Biblioteca del Congreso Nacional de Chile, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cámpoli, Gabriel. La firma electrónica en el régimen comercial mexicano. Porrúa Hermanos, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rica, Costa. Ley de certificados, firmas digitales y documentos electrónicos: Con índice alfabético. Editorial Investigaciones Jurídicas S.A., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Fernández, Francisco Javier Barreiros. Notariado y contratación electrónica. Colegios Notariales de España, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rica, Costa. Ley de certificados, firmas digitales y documentos electrónicos y su reglamento: Ley 8454 del 30 de agosto de 2005. Imprenta Nacional, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Signature Authentication"

1

Yeung, Dit-Yan, Hong Chang, Yimin Xiong, et al. "SVC2004: First International Signature Verification Competition." In Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zimmer, Alessandro, and Lee Luan Ling. "A Window-Based Hybrid Signature Verification System." In Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_77.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hangai, Seiichiro, and Takeshi Higuchi. "Writer Identification Using Finger-Bend in Writing Signature." In Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25976-3_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pal, Srikanta, Umapada Pal, and Michael Blumenstein. "Signature-Based Biometric Authentication." In Studies in Computational Intelligence. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05885-6_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kaijser, Per. "On Authentication, Digital Signatures and Signature Laws." In Secure Information Networks. Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35568-9_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Boyadzieva, Desislava, and Georgi Gluhchev. "Neural Network and kNN Classifiers for On-Line Signature Verification." In Biometric Authentication. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13386-7_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fierrez-Aguilar, J., J. Ortega-Garcia, and J. Gonzalez-Rodriguez. "Target Dependent Score Normalization Techniques and Their Application to Signature Verification." In Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_68.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kawamoto, Masato, Takayuki Hamamoto, and Seiichiro Hangai. "Improvement of On-line Signature Verification System Robust to Intersession Variability." In Biometric Authentication. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-47917-1_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sternby, Jakob. "On-Line Signature Verification by Explicit Solution to the Point Correspondence Problem." In Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_78.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Nakanishi, Isao, Naoto Nishiguchi, Yoshio Itoh, and Yutaka Fukui. "On-Line Signature Verification Based on Discrete Wavelet Domain Adaptive Signal Processing." In Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_80.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Signature Authentication"

1

Tripathi, Nikhil, Er Priya Mankotia, Aarushi, Rishabh Raj Maurya, and Kunal Shaw. "Sign Guard: Banking Signature Authentication." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10725893.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Shalini, Gudari Sai Prasad, and Iniyan S. "A Study for Automating Signature Authentication Systems." In 2024 Second International Conference on Advances in Information Technology (ICAIT). IEEE, 2024. http://dx.doi.org/10.1109/icait61638.2024.10690547.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Han, Chao, Song Gao, Tingjian Liu, Jianchao Xu, and Tao Wen. "Joint signature authentication scheme based on blockchain technology." In The International Conference on Optical Communication and Optoelectronic Technology (OCOT 2024), edited by Mário F. Ferreira. SPIE, 2024. http://dx.doi.org/10.1117/12.3044453.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Eladlani, Mohamed Alae-Eddine, Larbi Boubchir, and Khadidja Benallou. "Online Signature Processing for Biometric User Authentication and Identification." In 2024 IEEE International Conference on Big Data (BigData). IEEE, 2024. https://doi.org/10.1109/bigdata62323.2024.10825440.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shetty, Nisha, Saritha Shetty, and Nikhil Shetty. "Deep Learning-Powered Signature Authentication: The SigVerify CNN Model." In 2025 Third International Conference on Augmented Intelligence and Sustainable Systems (ICAISS). IEEE, 2025. https://doi.org/10.1109/icaiss61471.2025.11042173.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

"REMOTE HANDWRITTEN SIGNATURE AUTHENTICATION." In 2nd International Conference on E-business and Telecommunication Networks. SciTePress - Science and and Technology Publications, 2005. http://dx.doi.org/10.5220/0001419203350339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yaacob, Asrul H., Nazrul M. Ahmad, Ridza Fauzi, and M. Shahir A. Majed Shikh. "IKE authentication using certificateless signature." In 2011 International Conference on Information Networking (ICOIN). IEEE, 2011. http://dx.doi.org/10.1109/icoin.2011.5723146.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhao, Yongjian. "Identity Authentication with Signature Verification." In 2019 11th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA). IEEE, 2019. http://dx.doi.org/10.1109/icmtma.2019.00045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rai, Ashutosh Kumar, Manmohan Singh, H. C. Sudheendramouli, Varij Panwar, N. Alangudi Balaji, and Ravish Kukreti. "Digital Signature for Content Authentication." In 2023 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI). IEEE, 2023. http://dx.doi.org/10.1109/accai58221.2023.10200472.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mohammed, Israa Bashir, Bashar Saadoon Mahdi, and Mustafa S. Kadhm. "Handwritten signature authentication using MobileNets." In 4TH INTERNATIONAL CONFERENCE ON INNOVATION IN IOT, ROBOTICS AND AUTOMATION (IIRA 4.0). AIP Publishing, 2025. https://doi.org/10.1063/5.0256151.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Signature Authentication"

1

Polk, W. Timothy, Hildegard Ferraiolo, and David Cooper. Cardholder authentication for the PIV digital signature key. National Institute of Standards and Technology, 2015. http://dx.doi.org/10.6028/nist.ir.7863.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Melnikov, A. Authentication-Results Registration for S/MIME Signature Verification. RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7281.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kivinen, T., and J. Snyder. Signature Authentication in the Internet Key Exchange Version 2 (IKEv2). RFC Editor, 2015. http://dx.doi.org/10.17487/rfc7427.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fu, D., and J. Solinas. IKE and IKEv2 Authentication Using the Elliptic Curve Digital Signature Algorithm (ECDSA). RFC Editor, 2007. http://dx.doi.org/10.17487/rfc4754.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lyons-Burke, Kathy. Federal agency use of public key technology for digital signatures and authentication. National Institute of Standards and Technology, 2000. http://dx.doi.org/10.6028/nist.sp.800-25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Weis, B. The Use of RSA/SHA-1 Signatures within Encapsulating Security Payload (ESP) and Authentication Header (AH). RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4359.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!