Artykuły w czasopismach na temat „Digital Signature Algorithm confidentiality”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Digital Signature Algorithm confidentiality”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Dhanashree, Toradmalle, Muthukuru Jayabhaskar, and Sathyanarayana B. "Certificateless and provably-secure digital signature scheme based on elliptic curve." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 4 (2019): 3228–31. https://doi.org/10.11591/ijece.v9i4.pp3228-3231.
Pełny tekst źródłaToradmalle, Dhanashree, Jayabhaskar Muthukuru, and B. Sathyanarayana. "Certificateless and provably-secure digital signature scheme based on elliptic curve." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 4 (2019): 3228. http://dx.doi.org/10.11591/ijece.v9i4.pp3228-3231.
Pełny tekst źródłaOctora Ginting, Ferraro S., Veithzal Rivai Zainal, and Aziz Hakim. "Digital Signature Standard Implementation Strategy by Optimizing Hash Functions Through Performance Optimization." Journal of Accounting and Finance Management 3, no. 6 (2023): 362–71. http://dx.doi.org/10.38035/jafm.v3i6.175.
Pełny tekst źródłaHoang, Sy Tuong, Quang Trung Do, and Nhu Quynh Luc. "Build a Blockchain-based confidentiality and privacy solution using cryptographic techniques." Ministry of Science and Technology, Vietnam 65, no. 3 (2023): 1–6. http://dx.doi.org/10.31276/vjst.65(3).01-06.
Pełny tekst źródłaNadzifarin, Aulia, and Asmunin Asmunin. "Penerapan Elliptic Curve Digital Signature Algorithm pada Tanda Tangan Digital dengan Studi Kasus Dokumen Surat – Menyurat." Journal of Informatics and Computer Science (JINACS) 4, no. 01 (2022): 1–9. http://dx.doi.org/10.26740/jinacs.v4n01.p1-9.
Pełny tekst źródłaIndah Lestari, Rahayu, Vera Suryani, and Aulia Arif Wardhana. "Digital Signature Method to Overcome Sniffing Attacks on LoRaWAN Network." International journal of electrical and computer engineering systems 13, no. 7 (2022): 533–39. http://dx.doi.org/10.32985/ijeces.13.7.5.
Pełny tekst źródłaMUSTAFA, HUSSEIN, ELHADY MAHMOUD ABD, HAMDY SARA, and ALSOBKY WAGEDA. "DESIGNING NEW TECHNIQUE IN DIGITAL SIGNATURE BASED ON GALOIS FIELD 2n AND CHAOTIC MAPS." Seybold Report Journal 18, no. 09 (2023): 53–72. https://doi.org/10.5281/zenodo.8344314.
Pełny tekst źródłaPaulus, Erick, and Mochamad Azmi Fauzan. "A Framework to Ensure Data Integrity and Safety." Data Science: Journal of Computing and Applied Informatics 2, no. 1 (2018): 1–11. http://dx.doi.org/10.32734/jocai.v2.i1-90.
Pełny tekst źródłaSun, Feifei, and Guohong Shi. "Application Research in Computer Vision Signature Encryption System of Enterprise Contract Economic Management." Wireless Communications and Mobile Computing 2022 (May 13, 2022): 1–5. http://dx.doi.org/10.1155/2022/9677942.
Pełny tekst źródłaSihombing, Grace Lamudur Arta. "HYBRID CHRIPTOGRAPHY STREAM CIPHER AND RSA ALGORITHM WITH DIGITAL SIGNATURE AS A KEY." InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan) 1, no. 2 (2017): 75–83. http://dx.doi.org/10.30743/infotekjar.v1i2.66.
Pełny tekst źródłaKumar, Pankaj, Saurabh Kumar Sharma, and Kaveri Umesh Kadam. "Empirical Evaluation of ECC Batch Verification Algorithms of Digital Signature in Wireless Sensor Network." Electronics ETF 26, no. 2 (2022): 53–64. http://dx.doi.org/10.53314/els2226053k.
Pełny tekst źródłaNuraeni, Fitri, Dede Kurniadi, and Diva Nuratnika Rahayu. "IMPLEMENTATION OF RSA AND AES-128 SUPER ENCRYPTION ON QR-CODE BASED DIGITAL SIGNATURE SCHEMES FOR DOCUMENT LEGALIZATION." Jurnal Teknik Informatika (Jutif) 5, no. 3 (2024): 675–84. https://doi.org/10.52436/1.jutif.2024.5.3.1426.
Pełny tekst źródłaSusilawati Mohamad, Fatma, Fadi Mohammad Alsuhimat, Mohamad Afendee Mohamed, Mumtazimah Mohamad, and Azrul Amri Jamal. "Detection and Feature Extraction for Images Signatures." International Journal of Engineering & Technology 7, no. 3.28 (2018): 44. http://dx.doi.org/10.14419/ijet.v7i3.28.20963.
Pełny tekst źródłaYusuf, Hasril, Afriyudi Afriyudi, and Hadi Syaputra. "Digital Signature Pada Citra Digital Menggunakan Algoritma Rc6 Studi Kasus: Dokumen Kartu Keluarga." Journal of Computer and Information Systems Ampera 1, no. 1 (2020): 44–52. http://dx.doi.org/10.51519/journalcisa.v1i1.4.
Pełny tekst źródłaDavid, Shibin, and G. Jaspher W. Kathrine. "Digital Signature Algorithm for M-Payment Applications Using Arithmetic Encoding and Factorization Algorithm." Journal of Cases on Information Technology 23, no. 3 (2021): 11–26. http://dx.doi.org/10.4018/jcit.20210701.oa2.
Pełny tekst źródłaLin, Baode, Zhenwei Geng, and Fengrong Yu. "Information Security Protection of Internet of Energy Using Ensemble Public Key Algorithm under Big Data." Journal of Electrical and Computer Engineering 2023 (February 17, 2023): 1–10. http://dx.doi.org/10.1155/2023/6853902.
Pełny tekst źródłaHendry Leo Kanickam, S., and L. Jayasimman. "Comparative Analysis of Hash Authentication Algorithms and ECC Based Security Algorithms in Cloud Data." Asian Journal of Computer Science and Technology 8, no. 1 (2019): 53–61. http://dx.doi.org/10.51983/ajcst-2019.8.1.2118.
Pełny tekst źródłaPenubadi, Harshavardhan Reddy, Pritesh Shah, Ravi Sekhar, et al. "Sustainable electronic document security: a comprehensive framework integrating encryption, digital signature and watermarking algorithms." Heritage and Sustainable Development 5, no. 2 (2023): 391–404. http://dx.doi.org/10.37868/hsd.v5i2.359.
Pełny tekst źródłaChen, Zao. "Federated Learning based on Homomorphic Encryption and Digital Signatures." Highlights in Science, Engineering and Technology 39 (April 1, 2023): 595–603. http://dx.doi.org/10.54097/hset.v39i.6596.
Pełny tekst źródłaDevendra, Dandekar Pranjali Dandekar Rohanak Pawar Nikhil Kamble Sandip Patil. "Document Verification System in Blockchain Technique by using Hash & Digital Signature Algorithm." International Journal of Advanced Innovative Technology in Engineering 10, no. 2 (2025): 145–52. https://doi.org/10.5281/zenodo.15423140.
Pełny tekst źródłaMark Espalmado, John, and Edwin Arboleda. "DARE Algorithm: A New Security Protocol by Integration of Different Cryptographic Techniques." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 2 (2017): 1032. http://dx.doi.org/10.11591/ijece.v7i2.pp1032-1041.
Pełny tekst źródłaJean Pierre Ntayagabiri, Jeremie Ndikumagenge, Youssef Bentaleb, and Hind El Makhtoum. "Comparative Analysis of Elliptic Curve-Based Cryptographic Approaches for Internet of Things Security." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 1077–92. https://doi.org/10.32628/cseit2410457.
Pełny tekst źródłaJohn, Mark B. Espalmado, and R. Arboleda Edwin. "DARE Algorithm: A New Security Protocol by Integration of Different Cryptographic Techniques." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 2 (2017): 1032–41. https://doi.org/10.11591/ijece.v7i2.pp1032-1041.
Pełny tekst źródłaЛАВРИК, ІВАН. "ДОСЛІДЖЕННЯ АЛГОРИТМІВ ПОСТКВАНТОВОГО ЦИФРОВОГО ПІДПИСУ". Herald of Khmelnytskyi National University. Technical sciences 333, № 2 (2024): 361–69. http://dx.doi.org/10.31891/2307-5732-2024-333-2-56.
Pełny tekst źródłaDr.Yakubu, Ajiji Maker. "The Importance of Cryptography in Digital Signatures." International Journal of Information Technology 3, no. 8 (2020): 1–12. https://doi.org/10.5281/zenodo.3685178.
Pełny tekst źródłaRushda, Naushad Dakhni, and I. Sandilkar Saniya. "Implementation of RSA Algorithm for Encryption and Decryption Recent Technology Trends in Computer Technology." International Journal of Advanced Research in Science, Communication and Technology (IJARSCT) 3, no. 19 (2023): 66–70. https://doi.org/10.5281/zenodo.8133459.
Pełny tekst źródłaSadikin, Mohamad Ali, and Rini Wisnu Wardhani. "Implementation of RSA 2048-bit and AES 256-bit with Digital Signature for Secure Electronic Health Record Application." CommIT (Communication and Information Technology) Journal 10, no. 2 (2016): 63. http://dx.doi.org/10.21512/commit.v10i2.1549.
Pełny tekst źródłaPatil, Girish, Kartik Nillawar, Mohit Khatri, Sachin Shetkar, and Snehal Shinde. "Smart Way for Prescribing Medication." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 6795–800. http://dx.doi.org/10.22214/ijraset.2023.53317.
Pełny tekst źródłaGour, Ayush, Simarjit Singh Malhi, Gursharan Singh, and Gursimran Kaur. "Hybrid Cryptographic Approach: For Secure Data Communication using Block Cipher Techniques." E3S Web of Conferences 556 (2024): 01048. http://dx.doi.org/10.1051/e3sconf/202455601048.
Pełny tekst źródłaSharma, Arvind K., and Sudesh K. Mittal. "Cryptographic Keyed Hash Function: PARAŚU-256." Journal of Computational and Theoretical Nanoscience 17, no. 11 (2020): 5072–84. http://dx.doi.org/10.1166/jctn.2020.9343.
Pełny tekst źródłaBourair, Bourair, Noora zidan .., Bourair Al Al-Attar, Hussein A. Hussein Al Naffakh, and J. F. F.Tawfeq. "Implementation of novel cryptographic technique for enhancing the cipher security for Resilient Infrastructure." Fusion: Practice and Applications 15, no. 1 (2024): 32–44. http://dx.doi.org/10.54216/fpa.150103.
Pełny tekst źródłaHouari, Nawal Sad, Fatima Kabli, and Affaf Matoug. "Integration of IMEI, RSA, and Signature to Secure Communication in Mobile Applications." International Journal of Organizational and Collective Intelligence 12, no. 1 (2022): 1–18. http://dx.doi.org/10.4018/ijoci.306979.
Pełny tekst źródłaKhalid, Zhwan Mohammed, and Shavan Askar. "Resistant Blockchain Cryptography to Quantum Computing Attacks." International Journal of Science and Business 5, no. 3 (2021): 116–25. https://doi.org/10.5281/zenodo.4497732.
Pełny tekst źródłaHarsh Verma. "Hybrid Data Integrity Verification for Real-Time IoT Systems Using AEAD and VRF with ECDSA." Journal of Information Systems Engineering and Management 10, no. 34s (2025): 855–67. https://doi.org/10.52783/jisem.v10i34s.5875.
Pełny tekst źródłaSatrasupalli, Sivaji, and S. Vishnu. "An Encryption Algorithm for Enhanced Image Security." International Journal of Engineering and Advanced Technology 9, no. 1s5 (2019): 81–84. http://dx.doi.org/10.35940/ijeat.a1020.1291s519.
Pełny tekst źródłaTsai, Chwei-Shyong, Hsin-Liang Chen, Hsien-Chu Wu, and Josh Jia-Ching Ying. "A Puzzle-Based Data Sharing Approach with Cheating Prevention Using QR Code." Symmetry 13, no. 10 (2021): 1896. http://dx.doi.org/10.3390/sym13101896.
Pełny tekst źródłaJ., Williams,, Bennett, E. O., and Anireh, V.I.E. "An efficient algorithm for text encryption on android devices." International Journal of Engineering and Computer Science 13, no. 07 (2024): 26229–35. http://dx.doi.org/10.18535/ijecs/v13i07.4843.
Pełny tekst źródłaEsh Narayan. "Cryptography Security of Digital Signals using Golden Matrix with Recurrence Relations." Journal of Information Systems Engineering and Management 10, no. 14s (2025): 845–56. https://doi.org/10.52783/jisem.v10i14s.2400.
Pełny tekst źródłaAkanksha, Tomar* Jamwant Kumbhre. "SURVEY ON CLOUD SECURITY BY DATA ENCRYPTION USING ELLIPTIC CURVE CRYPTOGRAPHY." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 12 (2016): 992–97. https://doi.org/10.5281/zenodo.225383.
Pełny tekst źródłaVENKATESWARAN, N. "A SECURE BLOCKCHAIN FRAMEWORK FOR COLLABORATIVE SERVICE." International Scientific Journal of Engineering and Management 04, no. 06 (2025): 1–9. https://doi.org/10.55041/isjem04609.
Pełny tekst źródłaAlShalaan, Manal Rajeh, and Suliman Mohamed Fati. "Enhancing Organizational Data Security on Employee-Connected Devices Using BYOD Policy." Information 14, no. 5 (2023): 275. http://dx.doi.org/10.3390/info14050275.
Pełny tekst źródłaShaaban, Mohamed Ali, Almohammady S. Alsharkawy, Mohammad T. AbouKreisha, and Mohammed Abdel Razek. "Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment." International journal of Computer Networks & Communications 15, no. 04 (2023): 55–71. http://dx.doi.org/10.5121/ijcnc.2023.15404.
Pełny tekst źródłaVS, Barath. "Secured Folder Encryption and Decryption." International Journal for Research in Applied Science and Engineering Technology 12, no. 11 (2024): 121–29. http://dx.doi.org/10.22214/ijraset.2024.64953.
Pełny tekst źródłaPrasad, V. Hari, Mohammed Rafi, Mohammad Khaleel Ahmed, Ashraf Ben Miled, and Mahammad Shabana. "Random Self-Generative Schnorr Certificate less Signcryption for Secure Data Sharing in Mobile Cloud Environments." WSEAS TRANSACTIONS ON COMPUTER RESEARCH 13 (April 10, 2025): 270–80. https://doi.org/10.37394/232018.2025.13.25.
Pełny tekst źródłaKim, Dohoon, Sang Seo, Heesang Kim, Won Gi Lim, and Youn Kyu Lee. "A Study on the Concept of Using Efficient Lightweight Hash Chain to Improve Authentication in VMF Military Standard." Applied Sciences 10, no. 24 (2020): 8999. http://dx.doi.org/10.3390/app10248999.
Pełny tekst źródłaHafeez, Muhammad Asfand, Kazi Hassan Shakib, and Arslan Munir. "A Secure and Scalable Authentication and Communication Protocol for Smart Grids." Journal of Cybersecurity and Privacy 5, no. 2 (2025): 11. https://doi.org/10.3390/jcp5020011.
Pełny tekst źródłaNurcahya, Saputra Dwi, Dian Nazelliana, and Purwanti . "Implementasi Algoritma Kriptografi Chiper Simetris Menggunakan Bahasa Pemrograman PHP." Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) 8, no. 2 (2025): 1084–89. https://doi.org/10.32672/jnkti.v8i2.8989.
Pełny tekst źródłaBenmenzer, Faiza, and Rachid Beghdad. "Combining Elliptic Curve Cryptography and Blockchain Technology to Secure Data Storage in Cloud Environments." International Journal of Information Security and Privacy 16, no. 1 (2022): 1–20. http://dx.doi.org/10.4018/ijisp.307072.
Pełny tekst źródłaChen, Jiaoyue, Qihui Zuo, Wenquan Jin, Yujing Wu, Yihu Xu, and Yinan Xu. "Study of Network Security Based on Key Management System for In-Vehicle Ethernet." Electronics 13, no. 13 (2024): 2524. http://dx.doi.org/10.3390/electronics13132524.
Pełny tekst źródłaAmbareen, Javeria, M. Prabhakar, and Tabassum Ara. "LEES: a Hybrid Lightweight Elliptic ElGamal-Schnorr-Based Cryptography for Secure D2D Communications." Journal of Telecommunications and Information Technology 2 (March 30, 2021): 24–30. http://dx.doi.org/10.26636/jtit.2021.146020.
Pełny tekst źródła