Gotowa bibliografia na temat „Signature Authentication”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Signature Authentication”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Signature Authentication"

1

PU, Guangning, and Fengmei YIN. "An Anonymous Authentication Scheme with Selective Linkability and Threshold Traceability." Wuhan University Journal of Natural Sciences 28, no. 4 (2023): 317–23. http://dx.doi.org/10.1051/wujns/2023284317.

Pełny tekst źródła
Streszczenie:
In order to protect the user's privacy identity, authentication requires anonymous authentication. Anonymous authentication is divided into unconditional anonymous authentication and traceable anonymous authentication. Unconditional anonymous authentication can verify that the user belongs to an anonymous set, but the user's true identity cannot be obtained. However, in some applications, it is necessary to trace the true identity of the user. Therefore, a traceable anonymous authentication scheme is proposed. In order to prevent random tracing, the proposed scheme uses threshold joint tracing
Style APA, Harvard, Vancouver, ISO itp.
2

Mohd Taib Wahid, Mohd Taib Wahid. "Enhancement of DTW Algorithm in on-Line Signature Mapping Using the Lost-Box Recovery Algorithm." journal of king abdulaziz university computing and information technology sciences 1, no. 2 (2012): 105–22. http://dx.doi.org/10.4197/comp.1-2.5.

Pełny tekst źródła
Streszczenie:
Signature is a common practice as a way of identifies authentication or verification. Signature On-line validation and authentication is a field of authenticating the time series signature data which is generally acquired from the tablet-based device. Different from common traditional signature image, the on-line signature image data contain number of points that are arranged in sequence of time. The aim of this research is to enhance existing approach to map the strokes in both test and reference signatures. Current methods make use of the DTW (Dynamic Time Warping) algorithm and its deviate
Style APA, Harvard, Vancouver, ISO itp.
3

Dr., Praveen Kumar K. V., Kumar Mandal Pramit, Anand Rishav, Singh Sakshee, and Choskit Tsewang. "Signature Forgery Detection." International Journal of Innovative Science and Research Technology (IJISRT) 9, no. 3 (2024): 6. https://doi.org/10.5281/zenodo.10793129.

Pełny tekst źródła
Streszczenie:
The usage of advanced signature verification technologies is required because of the growing dependence on digital transactions and authentication technology. This survey looks at the current state of dynamic signature representation techniques, with a focus on learning without forgeries. The efficacy of enhancing the security of signature-based authentication systems through the combination of 1D CNNs and the novel signature embedding approach Synsig2Vec is assessed. The survey's first section addresses the dangers of forgery attacks and the weaknesses of employing traditional signature verif
Style APA, Harvard, Vancouver, ISO itp.
4

Huang, Juanjuan, Yuhang Xue, and Linhui Liu. "Dynamic Signature Verification Technique for the Online and Offline Representation of Electronic Signatures in Biometric Systems." Processes 11, no. 1 (2023): 190. http://dx.doi.org/10.3390/pr11010190.

Pełny tekst źródła
Streszczenie:
Biometric systems input physical or personal human characteristics for identification, authentication, and security purposes. With the advancement in communication and intelligent security systems, biometrics are programmed to validate electronic signatures (E-signatures) for online and offline authentication. This article introduces a dynamic signature verification technique (DSVT) using mutual compliance (MC) between the security system and the biometric device. The security system is responsible for online and offline signature approval using personal inputs from humans. This personal verif
Style APA, Harvard, Vancouver, ISO itp.
5

Nista, Elizabeth. "Signature Authentication." Biology of Blood and Marrow Transplantation 19, no. 2 (2013): S170. http://dx.doi.org/10.1016/j.bbmt.2012.11.144.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Farida, Yeni, Arsya Dyani Azzahra, Andriani Adi Lestari, Sepha Siswantyo, Annisa Dini Handayani, and Dimas Febriyan Priambodo. "A Security Enhancement to The Secure Mutual Authentication Protocol for Fog/Edge." Jurnal Nasional Pendidikan Teknik Informatika (JANAPATI) 14, no. 1 (2025): 73–80. https://doi.org/10.23887/janapati.v14i1.84725.

Pełny tekst źródła
Streszczenie:
A secured mutual authentication protocol (SMAP Fog/Edge) has been developed for fog computing. The protocol provides secure mutual authentication which lightweight and efficient for fog computing environments. However, based on AVISPA’s verification from Azzahra research, this protocol has been found to be vulnerable to man-in-the-middle (MITM) attacks due to the absence of an authentication scheme between authentication server and the edge user. The attacks are carried out assuming that the public key of the fog server is not distributed over a secure channel. Rhim research and Lestari resear
Style APA, Harvard, Vancouver, ISO itp.
7

Jang, Jae Young, Soo Young Jeong, Hyun Il Kim, and Chang Ho Seo. "A Study on Multi-Signature Scheme for Efficient User Authentication in Metaverse." Korean Institute of Smart Media 12, no. 2 (2023): 27–35. http://dx.doi.org/10.30693/smj.2023.12.2.27.

Pełny tekst źródła
Streszczenie:
Currently, online user authentication is perform using joint certificates issued by accredited certification authorities and simple certificates issued by private agency. In such a PKI(Public Key Infrastructure) system, various cryptographic technologies are used, and in particular, digital signatures are used as a core technology. The digital signature scheme is equally used in DID(Decentralized Identity), which is attracting attention to replace the existing centralized system. As such, the digital signature-based user authentication used in current online services is also applied in the met
Style APA, Harvard, Vancouver, ISO itp.
8

R. Saleh, Shaymaa, Zamen F. Jabr, and Abeer N. Fasial. "A Hybrid Features for Signature Recognition Using Neural Network." University of Thi-Qar Journal of Science 6, no. 1 (2016): 83–89. http://dx.doi.org/10.32792/utq/utjsci/v6i1.52.

Pełny tekst źródła
Streszczenie:
In automatic personal recognition systems, biometric features is used as recognition measure based on biological traits such as face, iris, fingerprint, etc…or gait, signature which is considered behavioral characteristics. Signature verification is one of the authentication methods which can provide security at maintenance and low cost. The most essential and challenging stage of any off-line signature system is feature extraction stage. The accuracy and robust of the recognition system depends basically on the usefulness of the signature features extracted by this system. If the extracted fe
Style APA, Harvard, Vancouver, ISO itp.
9

Mosaher, Quazi Saad-ul, and Mousumi Hasan. "Offline Handwritten Signature Recognition Using Deep Convolution Neural Network." European Journal of Engineering and Technology Research 7, no. 4 (2022): 44–47. http://dx.doi.org/10.24018/ejeng.2022.7.4.2851.

Pełny tekst źródła
Streszczenie:
In the modern age, technological advancement reached a new limit where authentication plays a vital role in security management. Biometric-based authentication is the most referenced procedure for authentication where signature verification is a significant part of it for authentication of a person. To prevent the falsification of signatures on important documents & legal transactions it is necessary to recognize a person's signature accurately. This paper focused on recognizing offline handwritten original & forged signatures using a deep convolution neural network. We use a completel
Style APA, Harvard, Vancouver, ISO itp.
10

Oida, Kazumasa. "Uniqueness and Reproducibility of Traffic Signatures." Journal of Telecommunications and Information Technology, no. 4 (December 30, 2015): 44–53. http://dx.doi.org/10.26636/jtit.2015.4.984.

Pełny tekst źródła
Streszczenie:
Usable user authentication is an important research topic. The traffic signature-based approach is a new authentication technology that identifies the devices used by online users based on traffic signatures, where the traffic signature is a statistic of the video stream delivered by the authentication server to the user device. This approach has two advantages. First, users need not do any operations regarding the device identification. Second, users need not be sensitive to the privacy loss and computer theft. In this paper, an author evaluates the uniqueness and reproducibility of the signa
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "Signature Authentication"

1

Chandrasekhar, Santosh. "CONSTRUCTION OF EFFICIENT AUTHENTICATION SCHEMES USING TRAPDOOR HASH FUNCTIONS." UKnowledge, 2011. http://uknowledge.uky.edu/gradschool_diss/162.

Pełny tekst źródła
Streszczenie:
In large-scale distributed systems, where adversarial attacks can have widespread impact, authentication provides protection from threats involving impersonation of entities and tampering of data. Practical solutions to authentication problems in distributed systems must meet specific constraints of the target system, and provide a reasonable balance between security and cost. The goal of this dissertation is to address the problem of building practical and efficient authentication mechanisms to secure distributed applications. This dissertation presents techniques to construct efficient digit
Style APA, Harvard, Vancouver, ISO itp.
2

Guzman, Tamayo Ana M. "Thermal Imaging As A Biometrics Approach To Facial Signature Authentication." FIU Digital Commons, 2011. http://digitalcommons.fiu.edu/etd/539.

Pełny tekst źródła
Streszczenie:
This dissertation develops an image processing framework with unique feature extraction and similarity measurements for human face recognition in the mid-wave infrared portion of the electromagnetic spectrum. The goal is to design specialized algorithms that would extract vasculature information, create a thermal facial signature and identify the individual. The objective is to use such findings in support of a biometrics system for human identification with a high degree of accuracy and a high degree of reliability. This last assertion is due to the minimal to no risk for potential alteration
Style APA, Harvard, Vancouver, ISO itp.
3

Yu, Ping. "Direct Online/Offline Digital Signature Schemes." Thesis, University of North Texas, 2008. https://digital.library.unt.edu/ark:/67531/metadc9717/.

Pełny tekst źródła
Streszczenie:
Online/offline signature schemes are useful in many situations, and two such scenarios are considered in this dissertation: bursty server authentication and embedded device authentication. In this dissertation, new techniques for online/offline signing are introduced, those are applied in a variety of ways for creating online/offline signature schemes, and five different online/offline signature schemes that are proved secure under a variety of models and assumptions are proposed. Two of the proposed five schemes have the best offline or best online performance of any currently known technique
Style APA, Harvard, Vancouver, ISO itp.
4

Ge, He. "Flexible Digital Authentication Techniques." Thesis, University of North Texas, 2006. https://digital.library.unt.edu/ark:/67531/metadc5277/.

Pełny tekst źródła
Streszczenie:
Abstract This dissertation investigates authentication techniques in some emerging areas. Specifically, authentication schemes have been proposed that are well-suited for embedded systems, and privacy-respecting pay Web sites. With embedded systems, a person could own several devices which are capable of communication and interaction, but these devices use embedded processors whose computational capabilities are limited as compared to desktop computers. Examples of this scenario include entertainment devices or appliances owned by a consumer, multiple control and sensor systems in an automobil
Style APA, Harvard, Vancouver, ISO itp.
5

Chakrabarti, Saikat. "EFFICIENT AND SCALABLE NETWORK SECURITY PROTOCOLS BASED ON LFSR SEQUENCES." UKnowledge, 2008. http://uknowledge.uky.edu/gradschool_diss/640.

Pełny tekst źródła
Streszczenie:
The gap between abstract, mathematics-oriented research in cryptography and the engineering approach of designing practical, network security protocols is widening. Network researchers experiment with well-known cryptographic protocols suitable for different network models. On the other hand, researchers inclined toward theory often design cryptographic schemes without considering the practical network constraints. The goal of this dissertation is to address problems in these two challenging areas: building bridges between practical network security protocols and theoretical cryptography. This
Style APA, Harvard, Vancouver, ISO itp.
6

Qiang, Huang, and Yang Fan. "Study on Telemetry Data Authentication Protocol in Arms Control Verification." International Foundation for Telemetering, 1999. http://hdl.handle.net/10150/608729.

Pełny tekst źródła
Streszczenie:
International Telemetering Conference Proceedings / October 25-28, 1999 / Riviera Hotel and Convention Center, Las Vegas, Nevada<br>The arms control verification activity is executed between countries, so various telemetry data will be remote-transmitted in the public signal channel and can be easily tampered. In order to secure this data’s authenticity and integrality, the paper has established a Multi-layer Data Authentication Protocol (MDAP) in which the key cryptographic technologies are digital signature and authentication. Meanwhile, overall evaluations of MDAP have been presented. We pr
Style APA, Harvard, Vancouver, ISO itp.
7

Галушка, Олександр Сергійович, та Oleksandr Galushka. "Інформаційна система аутентифікації людини за її динамічним підписом". Thesis, Тернопільський національний технічний університет імені Івана Пулюя, 2013. http://elartu.tntu.edu.ua/handle/123456789/2710.

Pełny tekst źródła
Streszczenie:
Обґрунтовано використання нового методу прийняття рішень на основі стохастичної моделі динамічного підпису з використанням коефіцієнтів ортогонального перетворення як аутентифікаційних ознак.<br>The aim of work is to develop theoretical and based on probabilistic approach, mathematical models, methods of dynamic signatures and methods of decision- making for individual authentication tasks in information systems. Substantiated usage of a new method of decision-making based on a stochastic model of the on-line signature using orthogonal transformation coefficients as authentication attribu
Style APA, Harvard, Vancouver, ISO itp.
8

Thangavel, Jayakumar. "Digital Signature : Comparative study of its usage in developed and developing countries." Thesis, Uppsala universitet, Informationssystem, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-217960.

Pełny tekst źródła
Streszczenie:
The online trading is growing widely day by day, which makes safety the biggest concern while carrying out trading by electronic means. As many other operations can be done with digital environment and internet, operation that provides identity validation should also be added to the digital environment. When data are transferred, the user should make sure that there are no changes in the original data while transferring them from sender to receiver. And it has also become necessary to authenticate the users often to ensure security and to avoid fraud. There are lot of different ways of online
Style APA, Harvard, Vancouver, ISO itp.
9

Sarıer, Deniz Neyire [Verfasser]. "Biometric Cryptosystems : Authentication, Encryption and Signature for Biometric Identities [[Elektronische Ressource]] / Neyire Deniz Sarıer." Bonn : Universitäts- und Landesbibliothek Bonn, 2013. http://d-nb.info/1044870044/34.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Al-Fayoumi, Mustafa Ahmad. "Security performance analysis and enhancement of wireless authentication protocol based on digital signature scheme." Thesis, Anglia Ruskin University, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.490718.

Pełny tekst źródła
Streszczenie:
One of the most challenging problems introduced by mobile networking is security. Therefore, a secure and efficient authentication mechanism is especially needed for mobile communication systems. The authentication protocol incurs overheads on the transmission process. These overheads affect the mobile network performance such as delay and bandwidth.
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Książki na temat "Signature Authentication"

1

Aalberts, Babette. Digital signature blindness: Analysis of legislative approaches toward electronic authentication. Kluwer, 2000.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

United, States Congress Senate Committee on Banking Housing and Urban Affairs Subcommittee on Financial Services and Technology. Electronic authentication and digital signature: Hearing before the Subcommittee on Financial Services and Technology of the Committee on Banking, Housing, and Urban Affairs, United States Senate, One Hundred Fifth Congress, first session ... October 28, 1997. U.S. G.P.O., 1998.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

1963-, Langenbach C. J., and Ulrich Otto 1942-, eds. Elektronische Signaturen: Kulturelle Rahmenbedingungen einer technischen Entwicklung. Springer, 2002.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Viesca, Ma Isabel Huerta. Los prestadores de servicios de certificación en la contratación electrónica. Aranzadi Editorial, 2001.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Krafft, Alfredo Alejandro Reyes. La firma electrónica y las entidades de certificación. Editorial Porrúa, 2003.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Biblioteca del Congreso Nacional (Chile). Ley 19.799: Sobre documentos electronicos, firma electronica y servicios de certificación de dicha firma. Biblioteca del Congreso Nacional de Chile, 2002.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Cámpoli, Gabriel. La firma electrónica en el régimen comercial mexicano. Porrúa Hermanos, 2004.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Rica, Costa. Ley de certificados, firmas digitales y documentos electrónicos: Con índice alfabético. Editorial Investigaciones Jurídicas S.A., 2005.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Fernández, Francisco Javier Barreiros. Notariado y contratación electrónica. Colegios Notariales de España, 2000.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Rica, Costa. Ley de certificados, firmas digitales y documentos electrónicos y su reglamento: Ley 8454 del 30 de agosto de 2005. Imprenta Nacional, 2006.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Części książek na temat "Signature Authentication"

1

Yeung, Dit-Yan, Hong Chang, Yimin Xiong, et al. "SVC2004: First International Signature Verification Competition." In Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Zimmer, Alessandro, and Lee Luan Ling. "A Window-Based Hybrid Signature Verification System." In Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_77.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Hangai, Seiichiro, and Takeshi Higuchi. "Writer Identification Using Finger-Bend in Writing Signature." In Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25976-3_21.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Pal, Srikanta, Umapada Pal, and Michael Blumenstein. "Signature-Based Biometric Authentication." In Studies in Computational Intelligence. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05885-6_13.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Kaijser, Per. "On Authentication, Digital Signatures and Signature Laws." In Secure Information Networks. Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35568-9_8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Boyadzieva, Desislava, and Georgi Gluhchev. "Neural Network and kNN Classifiers for On-Line Signature Verification." In Biometric Authentication. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13386-7_16.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Fierrez-Aguilar, J., J. Ortega-Garcia, and J. Gonzalez-Rodriguez. "Target Dependent Score Normalization Techniques and Their Application to Signature Verification." In Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_68.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Kawamoto, Masato, Takayuki Hamamoto, and Seiichiro Hangai. "Improvement of On-line Signature Verification System Robust to Intersession Variability." In Biometric Authentication. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-47917-1_17.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Sternby, Jakob. "On-Line Signature Verification by Explicit Solution to the Point Correspondence Problem." In Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_78.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Nakanishi, Isao, Naoto Nishiguchi, Yoshio Itoh, and Yutaka Fukui. "On-Line Signature Verification Based on Discrete Wavelet Domain Adaptive Signal Processing." In Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_80.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Signature Authentication"

1

Tripathi, Nikhil, Er Priya Mankotia, Aarushi, Rishabh Raj Maurya, and Kunal Shaw. "Sign Guard: Banking Signature Authentication." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10725893.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Singh, Shalini, Gudari Sai Prasad, and Iniyan S. "A Study for Automating Signature Authentication Systems." In 2024 Second International Conference on Advances in Information Technology (ICAIT). IEEE, 2024. http://dx.doi.org/10.1109/icait61638.2024.10690547.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Han, Chao, Song Gao, Tingjian Liu, Jianchao Xu, and Tao Wen. "Joint signature authentication scheme based on blockchain technology." In The International Conference on Optical Communication and Optoelectronic Technology (OCOT 2024), edited by Mário F. Ferreira. SPIE, 2024. http://dx.doi.org/10.1117/12.3044453.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Eladlani, Mohamed Alae-Eddine, Larbi Boubchir, and Khadidja Benallou. "Online Signature Processing for Biometric User Authentication and Identification." In 2024 IEEE International Conference on Big Data (BigData). IEEE, 2024. https://doi.org/10.1109/bigdata62323.2024.10825440.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Shetty, Nisha, Saritha Shetty, and Nikhil Shetty. "Deep Learning-Powered Signature Authentication: The SigVerify CNN Model." In 2025 Third International Conference on Augmented Intelligence and Sustainable Systems (ICAISS). IEEE, 2025. https://doi.org/10.1109/icaiss61471.2025.11042173.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

"REMOTE HANDWRITTEN SIGNATURE AUTHENTICATION." In 2nd International Conference on E-business and Telecommunication Networks. SciTePress - Science and and Technology Publications, 2005. http://dx.doi.org/10.5220/0001419203350339.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Yaacob, Asrul H., Nazrul M. Ahmad, Ridza Fauzi, and M. Shahir A. Majed Shikh. "IKE authentication using certificateless signature." In 2011 International Conference on Information Networking (ICOIN). IEEE, 2011. http://dx.doi.org/10.1109/icoin.2011.5723146.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Zhao, Yongjian. "Identity Authentication with Signature Verification." In 2019 11th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA). IEEE, 2019. http://dx.doi.org/10.1109/icmtma.2019.00045.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Rai, Ashutosh Kumar, Manmohan Singh, H. C. Sudheendramouli, Varij Panwar, N. Alangudi Balaji, and Ravish Kukreti. "Digital Signature for Content Authentication." In 2023 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI). IEEE, 2023. http://dx.doi.org/10.1109/accai58221.2023.10200472.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Mohammed, Israa Bashir, Bashar Saadoon Mahdi, and Mustafa S. Kadhm. "Handwritten signature authentication using MobileNets." In 4TH INTERNATIONAL CONFERENCE ON INNOVATION IN IOT, ROBOTICS AND AUTOMATION (IIRA 4.0). AIP Publishing, 2025. https://doi.org/10.1063/5.0256151.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Signature Authentication"

1

Polk, W. Timothy, Hildegard Ferraiolo, and David Cooper. Cardholder authentication for the PIV digital signature key. National Institute of Standards and Technology, 2015. http://dx.doi.org/10.6028/nist.ir.7863.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Melnikov, A. Authentication-Results Registration for S/MIME Signature Verification. RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7281.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Kivinen, T., and J. Snyder. Signature Authentication in the Internet Key Exchange Version 2 (IKEv2). RFC Editor, 2015. http://dx.doi.org/10.17487/rfc7427.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Fu, D., and J. Solinas. IKE and IKEv2 Authentication Using the Elliptic Curve Digital Signature Algorithm (ECDSA). RFC Editor, 2007. http://dx.doi.org/10.17487/rfc4754.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Lyons-Burke, Kathy. Federal agency use of public key technology for digital signatures and authentication. National Institute of Standards and Technology, 2000. http://dx.doi.org/10.6028/nist.sp.800-25.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Weis, B. The Use of RSA/SHA-1 Signatures within Encapsulating Security Payload (ESP) and Authentication Header (AH). RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4359.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!