Journal articles on the topic 'Signature Authentication'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Signature Authentication.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
PU, Guangning, and Fengmei YIN. "An Anonymous Authentication Scheme with Selective Linkability and Threshold Traceability." Wuhan University Journal of Natural Sciences 28, no. 4 (2023): 317–23. http://dx.doi.org/10.1051/wujns/2023284317.
Full textMohd Taib Wahid, Mohd Taib Wahid. "Enhancement of DTW Algorithm in on-Line Signature Mapping Using the Lost-Box Recovery Algorithm." journal of king abdulaziz university computing and information technology sciences 1, no. 2 (2012): 105–22. http://dx.doi.org/10.4197/comp.1-2.5.
Full textDr., Praveen Kumar K. V., Kumar Mandal Pramit, Anand Rishav, Singh Sakshee, and Choskit Tsewang. "Signature Forgery Detection." International Journal of Innovative Science and Research Technology (IJISRT) 9, no. 3 (2024): 6. https://doi.org/10.5281/zenodo.10793129.
Full textHuang, Juanjuan, Yuhang Xue, and Linhui Liu. "Dynamic Signature Verification Technique for the Online and Offline Representation of Electronic Signatures in Biometric Systems." Processes 11, no. 1 (2023): 190. http://dx.doi.org/10.3390/pr11010190.
Full textNista, Elizabeth. "Signature Authentication." Biology of Blood and Marrow Transplantation 19, no. 2 (2013): S170. http://dx.doi.org/10.1016/j.bbmt.2012.11.144.
Full textFarida, Yeni, Arsya Dyani Azzahra, Andriani Adi Lestari, Sepha Siswantyo, Annisa Dini Handayani, and Dimas Febriyan Priambodo. "A Security Enhancement to The Secure Mutual Authentication Protocol for Fog/Edge." Jurnal Nasional Pendidikan Teknik Informatika (JANAPATI) 14, no. 1 (2025): 73–80. https://doi.org/10.23887/janapati.v14i1.84725.
Full textJang, Jae Young, Soo Young Jeong, Hyun Il Kim, and Chang Ho Seo. "A Study on Multi-Signature Scheme for Efficient User Authentication in Metaverse." Korean Institute of Smart Media 12, no. 2 (2023): 27–35. http://dx.doi.org/10.30693/smj.2023.12.2.27.
Full textR. Saleh, Shaymaa, Zamen F. Jabr, and Abeer N. Fasial. "A Hybrid Features for Signature Recognition Using Neural Network." University of Thi-Qar Journal of Science 6, no. 1 (2016): 83–89. http://dx.doi.org/10.32792/utq/utjsci/v6i1.52.
Full textMosaher, Quazi Saad-ul, and Mousumi Hasan. "Offline Handwritten Signature Recognition Using Deep Convolution Neural Network." European Journal of Engineering and Technology Research 7, no. 4 (2022): 44–47. http://dx.doi.org/10.24018/ejeng.2022.7.4.2851.
Full textOida, Kazumasa. "Uniqueness and Reproducibility of Traffic Signatures." Journal of Telecommunications and Information Technology, no. 4 (December 30, 2015): 44–53. http://dx.doi.org/10.26636/jtit.2015.4.984.
Full textMuraharirao, Siva Charan, and Manik Lal Das. "Digital Image Protection using Keyed Hash Function." International Journal of Computer Vision and Image Processing 2, no. 2 (2012): 36–47. http://dx.doi.org/10.4018/ijcvip.2012040103.
Full textAndreevskih, D. A., S. D. Razboynikov, M. P. Silich, and K. S. Sarin. "Comparing the use of local and global features of handwritten signatures for user authentication." Proceedings of Tomsk State University of Control Systems and Radioelectronics 23, no. 4 (2020): 30–34. http://dx.doi.org/10.21293/1818-0442-2020-23-4-30-34.
Full textTurcanu, Dinu, Serghei Popovici, and Tatiana Turcanu. "DIGITAL SIGNATURE: ADVANTAGES, CHALLENGES AND STRATEGIES." Journal of Social Sciences III (4) (December 15, 2020): 62–72. https://doi.org/10.5281/zenodo.4296327.
Full textCheng, Huayang, Yang Li, Jing Yan, Dan Wang, Liangyu Dong, and Junjie Gu. "A security algorithm based on SM9 for interdomain communication." Journal of Physics: Conference Series 2906, no. 1 (2024): 012007. https://doi.org/10.1088/1742-6596/2906/1/012007.
Full textPrakash, Gautam S., and Shanu Sharma. "Offline Signature Verification and Forgery Detection Based on Computer Vision and Fuzzy Logic." IAES International Journal of Artificial Intelligence (IJ-AI) 3, no. 4 (2014): 156. http://dx.doi.org/10.11591/ijai.v3.i4.pp156-165.
Full textSangdiah, Nana Suarna, Irfan Ali, and Dendy Indriya Efendi. "Authenticity Accuracy Improvement Through the Analysis of Signature Ownership Using Convolutional Neural Network Algorithm." Journal of Artificial Intelligence and Engineering Applications (JAIEA) 4, no. 2 (2025): 1289–93. https://doi.org/10.59934/jaiea.v4i2.900.
Full textK N, Madhu, and Mrs Bhavana G. "Signature Recognition for Banking System." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (2022): 1555–58. http://dx.doi.org/10.22214/ijraset.2022.45500.
Full textAl-Tamimi, Abdel-Karim, Asseel Qasaimeh, and Kefaya Qaddoum. "Offline signature recognition system using oriented FAST and rotated BRIEF." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 5 (2021): 4095. http://dx.doi.org/10.11591/ijece.v11i5.pp4095-4103.
Full textAbdel-Karim, Al-Tamimi, Qasaimeh Asseel, and Qaddoum Kefaya. "Offline signature recognition system using oriented FAST and rotated BRIEF." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 5 (2021): 4095–103. https://doi.org/10.11591/ijece.v11i5.pp4095-4103.
Full textQiu, Shi, Fengchang Fei, and Ying Cui. "Offline Signature Authentication Algorithm Based on the Fuzzy Set." Mathematical Problems in Engineering 2021 (March 18, 2021): 1–8. http://dx.doi.org/10.1155/2021/5554341.
Full textChande, Manoj Kumar, Cheng-Chi Lee, and Chun-Ta Li. "A New Self-Certified Convertible Authenticated Encryption Scheme Based on Discrete Logarithm Problem." Parallel Processing Letters 26, no. 04 (2016): 1650018. http://dx.doi.org/10.1142/s0129626416500183.
Full textLi, Fengyin, Junhui Wang, Mengxue Shang, Dandan Zhang, and Tao Li. "Research on Quantum-Attack-Resistant Strong Forward-Secure Signature Schemes." Entropy 25, no. 8 (2023): 1159. http://dx.doi.org/10.3390/e25081159.
Full textSeo, Seog Chung, and Taek-Young Youn. "TLDA: An Efficient Two-Layered Data Authentication Mechanism for Content-Centric Networking." Security and Communication Networks 2018 (July 4, 2018): 1–17. http://dx.doi.org/10.1155/2018/5429798.
Full textZhou, Quan, Yulong Zheng, Kaijun Wei, Minhui Chen, and Zhikang Zeng. "A Multi-Party Functional Signatures Scheme for Private Blockchain." Cryptography 7, no. 2 (2023): 21. http://dx.doi.org/10.3390/cryptography7020021.
Full textNadimi Goki, Pantea, Thomas Teferi Mulugeta, Roberto Caldelli, and Luca Potì. "Optical Systems Identification through Rayleigh Backscattering." Sensors 23, no. 11 (2023): 5269. http://dx.doi.org/10.3390/s23115269.
Full textBojič Burgos, Jay, and Matevž Pustišek. "Decentralized IoT Data Authentication with Signature Aggregation." Sensors 24, no. 3 (2024): 1037. http://dx.doi.org/10.3390/s24031037.
Full textTehsin, Sara, Ali Hassan, Farhan Riaz, Inzamam Mashood Nasir, Norma Latif Fitriyani, and Muhammad Syafrudin. "Enhancing Signature Verification Using Triplet Siamese Similarity Networks in Digital Documents." Mathematics 12, no. 17 (2024): 2757. http://dx.doi.org/10.3390/math12172757.
Full textNadzifarin, Aulia, and Asmunin Asmunin. "Penerapan Elliptic Curve Digital Signature Algorithm pada Tanda Tangan Digital dengan Studi Kasus Dokumen Surat – Menyurat." Journal of Informatics and Computer Science (JINACS) 4, no. 01 (2022): 1–9. http://dx.doi.org/10.26740/jinacs.v4n01.p1-9.
Full textDiksha Singh, Dileep Kumar, and Poonam Prakash. "Analysis of Signature Patterns: Consistency and Distinctiveness in Handwritten Signatures for Forensic Authentication." Indian Journal of Forensic Medicine & Toxicology 18, no. 1 (2024): 26–34. http://dx.doi.org/10.37506/c15rg139.
Full textKurowski, Mariusz, Andrzej Sroczyński, Georgis Bogdanis, and Andrzej Czyżewski. "An Automated Method for Biometric Handwritten Signature Authentication Employing Neural Networks." Electronics 10, no. 4 (2021): 456. http://dx.doi.org/10.3390/electronics10040456.
Full textKokku, Sai Anoushka, Akila Telugu, Sreeja Kompelly, Mallikarjuna Rao Gundavarapu, and Sneha Nimmala. "Performance Analysis of Deep Learning Approaches for Offline Signature Verification." International Journal of Engineering and Advanced Technology 11, no. 4 (2022): 94–99. http://dx.doi.org/10.35940/ijeat.d3482.0411422.
Full textMallikarjuna, Rao Gundavarapu, Kompelly Sreeja, Anoushka Kokku Sai, Telugu Akila, and Nimmala Sneha. "Performance Analysis of Deep Learning Approaches for Offline Signature Verification." International Journal of Engineering and Advanced Technology (IJEAT) 12, no. 4 (2022): 94–99. https://doi.org/10.35940/ijeat.D3482.0411422.
Full textTsanta Christelle Nadège Ralaibozaka, Maminiaina Alphonse Rafidison, and Hajasoa Malalatiana Ramafiarisona. "CONTRIBUTION TO THE AUTHENTICITY OF DIGITIZED HANDWRITTEN SIGNATURES THROUGH DEEP LEARNING WITH RESNET-50 AND OCR." International Journal of Innovations in Engineering Research and Technology 11, no. 3 (2024): 20–25. http://dx.doi.org/10.26662/ijiert.v11i3.pp20-25.
Full textLu, Xiuhua, Wei Yin, Qiaoyan Wen, Kaitai Liang, Liqun Chen, and Jiageng Chen. "Message Integration Authentication in the Internet-of-Things via Lattice-Based Batch Signatures." Sensors 18, no. 11 (2018): 4056. http://dx.doi.org/10.3390/s18114056.
Full textVijayaragavan, Arun, J. Visumathi, and K. L. Shunmuganathan. "Cubic Bezier Curve Approach for Automated Offline Signature Verification with Intrusion Identification." Mathematical Problems in Engineering 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/928039.
Full textBeck, Gabrielle, Arka Rai Choudhuri, Matthew Green, Abhishek Jain, and Pratyush Ranjan Tiwari. "Time-Deniable Signatures." Proceedings on Privacy Enhancing Technologies 2023, no. 3 (2023): 79–102. http://dx.doi.org/10.56553/popets-2023-0071.
Full textSubpratatsavee, Puchong, and Wissawat Sakulsaknimit. "HC2D Barcode for Handwritings Verification Using Embedded Camera on Tablet." Applied Mechanics and Materials 752-753 (April 2015): 1069–72. http://dx.doi.org/10.4028/www.scientific.net/amm.752-753.1069.
Full textYang, Chengjun, Jiansheng Peng, Yong Xu, Qingjin Wei, Ling Zhou, and Yuna Tang. "Edge Computing-Based VANETs’ Anonymous Message Authentication." Symmetry 14, no. 12 (2022): 2662. http://dx.doi.org/10.3390/sym14122662.
Full textKhurana, Rupali, and Ekta Narwal. "Analysis of code-based digital signature schemes." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 5 (2023): 5534–41. https://doi.org/10.11591/ijece.v13i5.pp5534-5541.
Full textChubaievskyi, Vitalii, Nataliia Lutska, Tetyana Savchenko, Lidiia Vlasenko, and Kyrylo Synelnyk. "ENHANCED CRYPTOGRAPHIC SECURITY OF AGGREGATED DIGITAL SIGNATURES THROUGH UTILIZATION OF A UNIFIED AUTHENTICATION FRAMEWORK." Cybersecurity: Education, Science, Technique 2, no. 22 (2023): 39–53. http://dx.doi.org/10.28925/2663-4023.2023.22.3953.
Full textM, Azees, Arun Sekar Rajasekaran, and Muhammad Islam Satti. "An Anonymous Signature-Based Authentication and Key Agreement Scheme for Vehicular Ad Hoc Networks." Security and Communication Networks 2022 (July 18, 2022): 1–9. http://dx.doi.org/10.1155/2022/1222660.
Full textDr. S. Gomathi alias Rohini and K. R. Amuruthavarshini Priya. "Offline Signature Verification System using Convolutional Neural Networks." International Journal of Linguistics Applied Psychology and Technology (IJLAPT) 2, no. 03(Mar) (2025): 37–46. https://doi.org/10.69889/ijlapt.v2i03(mar).105.
Full textM Ranga Swamy. "CNN Versus Conditional Generative Adversarial Network cGAN–Digital Signature Authentication: Case Study." Journal of Information Systems Engineering and Management 10, no. 14s (2025): 396–412. https://doi.org/10.52783/jisem.v10i14s.2309.
Full textShang, Pei Ni, and Zhu Lian Gao. "An Authentication Scheme Based on the Light-Weight Rainbow Signature for Wireless Sensor Network." Applied Mechanics and Materials 519-520 (February 2014): 185–88. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.185.
Full textZhao, Run, Dong Wang, Qian Zhang, Xueyi Jin, and Ke Liu. "Smartphone-based Handwritten Signature Verification using Acoustic Signals." Proceedings of the ACM on Human-Computer Interaction 5, ISS (2021): 1–26. http://dx.doi.org/10.1145/3488544.
Full textSuhardi, Suhardi. "Use of QRCode and Digital Signature Using The DSA Method to Authenticate Student Academic Documents." Journal of Computer Networks, Architecture and High Performance Computing 6, no. 4 (2024): 1913–21. http://dx.doi.org/10.47709/cnahpc.v6i4.4765.
Full textWellem, Theophilus, Yessica Nataliani, and Ade Iriani. "Academic Document Authentication using Elliptic Curve Digital Signature Algorithm and QR Code." JOIV : International Journal on Informatics Visualization 6, no. 3 (2022): 667. http://dx.doi.org/10.30630/joiv.6.2.872.
Full textHAN, Songshen, Kaiyong XU, Zhiqiang ZHU, Songhui GUO, Haidong LIU, and Zuohui LI. "Hash-Based Signature for Flexibility Authentication of IoT Devices." Wuhan University Journal of Natural Sciences 27, no. 1 (2022): 1–10. http://dx.doi.org/10.1051/wujns/2022271001.
Full textDamanik, Abdi Rahim, Dedy Hartama, Sumarno Sumarno, and Indra Gunawan. "Sistem Presensi Pegawai Berbasis Digital Signatures Dan Gps Location." DIKE : Jurnal Ilmu Multidisiplin 1, no. 1 (2023): 30–36. http://dx.doi.org/10.69688/dike.v1i1.11.
Full textTanvir, Kazi. "Signature Verification System: Using Big Transfer (BiT-M-R50x1) for Accurate Authentication." Aug-Sept 2023, no. 35 (September 7, 2023): 10–19. http://dx.doi.org/10.55529/jipirs.35.10.19.
Full text