Academic literature on the topic 'Signature Authentication'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Signature Authentication.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Signature Authentication"
PU, Guangning, and Fengmei YIN. "An Anonymous Authentication Scheme with Selective Linkability and Threshold Traceability." Wuhan University Journal of Natural Sciences 28, no. 4 (2023): 317–23. http://dx.doi.org/10.1051/wujns/2023284317.
Full textMohd Taib Wahid, Mohd Taib Wahid. "Enhancement of DTW Algorithm in on-Line Signature Mapping Using the Lost-Box Recovery Algorithm." journal of king abdulaziz university computing and information technology sciences 1, no. 2 (2012): 105–22. http://dx.doi.org/10.4197/comp.1-2.5.
Full textDr., Praveen Kumar K. V., Kumar Mandal Pramit, Anand Rishav, Singh Sakshee, and Choskit Tsewang. "Signature Forgery Detection." International Journal of Innovative Science and Research Technology (IJISRT) 9, no. 3 (2024): 6. https://doi.org/10.5281/zenodo.10793129.
Full textNista, Elizabeth. "Signature Authentication." Biology of Blood and Marrow Transplantation 19, no. 2 (2013): S170. http://dx.doi.org/10.1016/j.bbmt.2012.11.144.
Full textHuang, Juanjuan, Yuhang Xue, and Linhui Liu. "Dynamic Signature Verification Technique for the Online and Offline Representation of Electronic Signatures in Biometric Systems." Processes 11, no. 1 (2023): 190. http://dx.doi.org/10.3390/pr11010190.
Full textFarida, Yeni, Arsya Dyani Azzahra, Andriani Adi Lestari, Sepha Siswantyo, Annisa Dini Handayani, and Dimas Febriyan Priambodo. "A Security Enhancement to The Secure Mutual Authentication Protocol for Fog/Edge." Jurnal Nasional Pendidikan Teknik Informatika (JANAPATI) 14, no. 1 (2025): 73–80. https://doi.org/10.23887/janapati.v14i1.84725.
Full textJang, Jae Young, Soo Young Jeong, Hyun Il Kim, and Chang Ho Seo. "A Study on Multi-Signature Scheme for Efficient User Authentication in Metaverse." Korean Institute of Smart Media 12, no. 2 (2023): 27–35. http://dx.doi.org/10.30693/smj.2023.12.2.27.
Full textR. Saleh, Shaymaa, Zamen F. Jabr, and Abeer N. Fasial. "A Hybrid Features for Signature Recognition Using Neural Network." University of Thi-Qar Journal of Science 6, no. 1 (2016): 83–89. http://dx.doi.org/10.32792/utq/utjsci/v6i1.52.
Full textMosaher, Quazi Saad-ul, and Mousumi Hasan. "Offline Handwritten Signature Recognition Using Deep Convolution Neural Network." European Journal of Engineering and Technology Research 7, no. 4 (2022): 44–47. http://dx.doi.org/10.24018/ejeng.2022.7.4.2851.
Full textOida, Kazumasa. "Uniqueness and Reproducibility of Traffic Signatures." Journal of Telecommunications and Information Technology, no. 4 (December 30, 2015): 44–53. http://dx.doi.org/10.26636/jtit.2015.4.984.
Full textDissertations / Theses on the topic "Signature Authentication"
Chandrasekhar, Santosh. "CONSTRUCTION OF EFFICIENT AUTHENTICATION SCHEMES USING TRAPDOOR HASH FUNCTIONS." UKnowledge, 2011. http://uknowledge.uky.edu/gradschool_diss/162.
Full textGuzman, Tamayo Ana M. "Thermal Imaging As A Biometrics Approach To Facial Signature Authentication." FIU Digital Commons, 2011. http://digitalcommons.fiu.edu/etd/539.
Full textYu, Ping. "Direct Online/Offline Digital Signature Schemes." Thesis, University of North Texas, 2008. https://digital.library.unt.edu/ark:/67531/metadc9717/.
Full textGe, He. "Flexible Digital Authentication Techniques." Thesis, University of North Texas, 2006. https://digital.library.unt.edu/ark:/67531/metadc5277/.
Full textChakrabarti, Saikat. "EFFICIENT AND SCALABLE NETWORK SECURITY PROTOCOLS BASED ON LFSR SEQUENCES." UKnowledge, 2008. http://uknowledge.uky.edu/gradschool_diss/640.
Full textQiang, Huang, and Yang Fan. "Study on Telemetry Data Authentication Protocol in Arms Control Verification." International Foundation for Telemetering, 1999. http://hdl.handle.net/10150/608729.
Full textГалушка, Олександр Сергійович, та Oleksandr Galushka. "Інформаційна система аутентифікації людини за її динамічним підписом". Thesis, Тернопільський національний технічний університет імені Івана Пулюя, 2013. http://elartu.tntu.edu.ua/handle/123456789/2710.
Full textThangavel, Jayakumar. "Digital Signature : Comparative study of its usage in developed and developing countries." Thesis, Uppsala universitet, Informationssystem, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-217960.
Full textSarıer, Deniz Neyire [Verfasser]. "Biometric Cryptosystems : Authentication, Encryption and Signature for Biometric Identities [[Elektronische Ressource]] / Neyire Deniz Sarıer." Bonn : Universitäts- und Landesbibliothek Bonn, 2013. http://d-nb.info/1044870044/34.
Full textAl-Fayoumi, Mustafa Ahmad. "Security performance analysis and enhancement of wireless authentication protocol based on digital signature scheme." Thesis, Anglia Ruskin University, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.490718.
Full textBooks on the topic "Signature Authentication"
Aalberts, Babette. Digital signature blindness: Analysis of legislative approaches toward electronic authentication. Kluwer, 2000.
Find full textUnited, States Congress Senate Committee on Banking Housing and Urban Affairs Subcommittee on Financial Services and Technology. Electronic authentication and digital signature: Hearing before the Subcommittee on Financial Services and Technology of the Committee on Banking, Housing, and Urban Affairs, United States Senate, One Hundred Fifth Congress, first session ... October 28, 1997. U.S. G.P.O., 1998.
Find full text1963-, Langenbach C. J., and Ulrich Otto 1942-, eds. Elektronische Signaturen: Kulturelle Rahmenbedingungen einer technischen Entwicklung. Springer, 2002.
Find full textViesca, Ma Isabel Huerta. Los prestadores de servicios de certificación en la contratación electrónica. Aranzadi Editorial, 2001.
Find full textKrafft, Alfredo Alejandro Reyes. La firma electrónica y las entidades de certificación. Editorial Porrúa, 2003.
Find full textBiblioteca del Congreso Nacional (Chile). Ley 19.799: Sobre documentos electronicos, firma electronica y servicios de certificación de dicha firma. Biblioteca del Congreso Nacional de Chile, 2002.
Find full textCámpoli, Gabriel. La firma electrónica en el régimen comercial mexicano. Porrúa Hermanos, 2004.
Find full textRica, Costa. Ley de certificados, firmas digitales y documentos electrónicos: Con índice alfabético. Editorial Investigaciones Jurídicas S.A., 2005.
Find full textFernández, Francisco Javier Barreiros. Notariado y contratación electrónica. Colegios Notariales de España, 2000.
Find full textRica, Costa. Ley de certificados, firmas digitales y documentos electrónicos y su reglamento: Ley 8454 del 30 de agosto de 2005. Imprenta Nacional, 2006.
Find full textBook chapters on the topic "Signature Authentication"
Yeung, Dit-Yan, Hong Chang, Yimin Xiong, et al. "SVC2004: First International Signature Verification Competition." In Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_3.
Full textZimmer, Alessandro, and Lee Luan Ling. "A Window-Based Hybrid Signature Verification System." In Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_77.
Full textHangai, Seiichiro, and Takeshi Higuchi. "Writer Identification Using Finger-Bend in Writing Signature." In Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25976-3_21.
Full textPal, Srikanta, Umapada Pal, and Michael Blumenstein. "Signature-Based Biometric Authentication." In Studies in Computational Intelligence. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05885-6_13.
Full textKaijser, Per. "On Authentication, Digital Signatures and Signature Laws." In Secure Information Networks. Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35568-9_8.
Full textBoyadzieva, Desislava, and Georgi Gluhchev. "Neural Network and kNN Classifiers for On-Line Signature Verification." In Biometric Authentication. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13386-7_16.
Full textFierrez-Aguilar, J., J. Ortega-Garcia, and J. Gonzalez-Rodriguez. "Target Dependent Score Normalization Techniques and Their Application to Signature Verification." In Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_68.
Full textKawamoto, Masato, Takayuki Hamamoto, and Seiichiro Hangai. "Improvement of On-line Signature Verification System Robust to Intersession Variability." In Biometric Authentication. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-47917-1_17.
Full textSternby, Jakob. "On-Line Signature Verification by Explicit Solution to the Point Correspondence Problem." In Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_78.
Full textNakanishi, Isao, Naoto Nishiguchi, Yoshio Itoh, and Yutaka Fukui. "On-Line Signature Verification Based on Discrete Wavelet Domain Adaptive Signal Processing." In Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_80.
Full textConference papers on the topic "Signature Authentication"
Tripathi, Nikhil, Er Priya Mankotia, Aarushi, Rishabh Raj Maurya, and Kunal Shaw. "Sign Guard: Banking Signature Authentication." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10725893.
Full textSingh, Shalini, Gudari Sai Prasad, and Iniyan S. "A Study for Automating Signature Authentication Systems." In 2024 Second International Conference on Advances in Information Technology (ICAIT). IEEE, 2024. http://dx.doi.org/10.1109/icait61638.2024.10690547.
Full textHan, Chao, Song Gao, Tingjian Liu, Jianchao Xu, and Tao Wen. "Joint signature authentication scheme based on blockchain technology." In The International Conference on Optical Communication and Optoelectronic Technology (OCOT 2024), edited by Mário F. Ferreira. SPIE, 2024. http://dx.doi.org/10.1117/12.3044453.
Full textEladlani, Mohamed Alae-Eddine, Larbi Boubchir, and Khadidja Benallou. "Online Signature Processing for Biometric User Authentication and Identification." In 2024 IEEE International Conference on Big Data (BigData). IEEE, 2024. https://doi.org/10.1109/bigdata62323.2024.10825440.
Full text"REMOTE HANDWRITTEN SIGNATURE AUTHENTICATION." In 2nd International Conference on E-business and Telecommunication Networks. SciTePress - Science and and Technology Publications, 2005. http://dx.doi.org/10.5220/0001419203350339.
Full textYaacob, Asrul H., Nazrul M. Ahmad, Ridza Fauzi, and M. Shahir A. Majed Shikh. "IKE authentication using certificateless signature." In 2011 International Conference on Information Networking (ICOIN). IEEE, 2011. http://dx.doi.org/10.1109/icoin.2011.5723146.
Full textZhao, Yongjian. "Identity Authentication with Signature Verification." In 2019 11th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA). IEEE, 2019. http://dx.doi.org/10.1109/icmtma.2019.00045.
Full textRai, Ashutosh Kumar, Manmohan Singh, H. C. Sudheendramouli, Varij Panwar, N. Alangudi Balaji, and Ravish Kukreti. "Digital Signature for Content Authentication." In 2023 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI). IEEE, 2023. http://dx.doi.org/10.1109/accai58221.2023.10200472.
Full textMohammed, Israa Bashir, Bashar Saadoon Mahdi, and Mustafa S. Kadhm. "Handwritten signature authentication using MobileNets." In 4TH INTERNATIONAL CONFERENCE ON INNOVATION IN IOT, ROBOTICS AND AUTOMATION (IIRA 4.0). AIP Publishing, 2025. https://doi.org/10.1063/5.0256151.
Full textBandyopadhyay, Samir Kumar. "A Method for Signature Authentication Scheme." In 2011 International Conference on Ubiquitious Computing and Multimedia Applications (UCMA). IEEE, 2011. http://dx.doi.org/10.1109/ucma.2011.18.
Full textReports on the topic "Signature Authentication"
Polk, W. Timothy, Hildegard Ferraiolo, and David Cooper. Cardholder authentication for the PIV digital signature key. National Institute of Standards and Technology, 2015. http://dx.doi.org/10.6028/nist.ir.7863.
Full textMelnikov, A. Authentication-Results Registration for S/MIME Signature Verification. RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7281.
Full textKivinen, T., and J. Snyder. Signature Authentication in the Internet Key Exchange Version 2 (IKEv2). RFC Editor, 2015. http://dx.doi.org/10.17487/rfc7427.
Full textFu, D., and J. Solinas. IKE and IKEv2 Authentication Using the Elliptic Curve Digital Signature Algorithm (ECDSA). RFC Editor, 2007. http://dx.doi.org/10.17487/rfc4754.
Full textLyons-Burke, Kathy. Federal agency use of public key technology for digital signatures and authentication. National Institute of Standards and Technology, 2000. http://dx.doi.org/10.6028/nist.sp.800-25.
Full textWeis, B. The Use of RSA/SHA-1 Signatures within Encapsulating Security Payload (ESP) and Authentication Header (AH). RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4359.
Full text