Artykuły w czasopismach na temat „Signature Authentication”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Signature Authentication”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
PU, Guangning, and Fengmei YIN. "An Anonymous Authentication Scheme with Selective Linkability and Threshold Traceability." Wuhan University Journal of Natural Sciences 28, no. 4 (2023): 317–23. http://dx.doi.org/10.1051/wujns/2023284317.
Pełny tekst źródłaMohd Taib Wahid, Mohd Taib Wahid. "Enhancement of DTW Algorithm in on-Line Signature Mapping Using the Lost-Box Recovery Algorithm." journal of king abdulaziz university computing and information technology sciences 1, no. 2 (2012): 105–22. http://dx.doi.org/10.4197/comp.1-2.5.
Pełny tekst źródłaDr., Praveen Kumar K. V., Kumar Mandal Pramit, Anand Rishav, Singh Sakshee, and Choskit Tsewang. "Signature Forgery Detection." International Journal of Innovative Science and Research Technology (IJISRT) 9, no. 3 (2024): 6. https://doi.org/10.5281/zenodo.10793129.
Pełny tekst źródłaHuang, Juanjuan, Yuhang Xue, and Linhui Liu. "Dynamic Signature Verification Technique for the Online and Offline Representation of Electronic Signatures in Biometric Systems." Processes 11, no. 1 (2023): 190. http://dx.doi.org/10.3390/pr11010190.
Pełny tekst źródłaNista, Elizabeth. "Signature Authentication." Biology of Blood and Marrow Transplantation 19, no. 2 (2013): S170. http://dx.doi.org/10.1016/j.bbmt.2012.11.144.
Pełny tekst źródłaFarida, Yeni, Arsya Dyani Azzahra, Andriani Adi Lestari, Sepha Siswantyo, Annisa Dini Handayani, and Dimas Febriyan Priambodo. "A Security Enhancement to The Secure Mutual Authentication Protocol for Fog/Edge." Jurnal Nasional Pendidikan Teknik Informatika (JANAPATI) 14, no. 1 (2025): 73–80. https://doi.org/10.23887/janapati.v14i1.84725.
Pełny tekst źródłaJang, Jae Young, Soo Young Jeong, Hyun Il Kim, and Chang Ho Seo. "A Study on Multi-Signature Scheme for Efficient User Authentication in Metaverse." Korean Institute of Smart Media 12, no. 2 (2023): 27–35. http://dx.doi.org/10.30693/smj.2023.12.2.27.
Pełny tekst źródłaR. Saleh, Shaymaa, Zamen F. Jabr, and Abeer N. Fasial. "A Hybrid Features for Signature Recognition Using Neural Network." University of Thi-Qar Journal of Science 6, no. 1 (2016): 83–89. http://dx.doi.org/10.32792/utq/utjsci/v6i1.52.
Pełny tekst źródłaMosaher, Quazi Saad-ul, and Mousumi Hasan. "Offline Handwritten Signature Recognition Using Deep Convolution Neural Network." European Journal of Engineering and Technology Research 7, no. 4 (2022): 44–47. http://dx.doi.org/10.24018/ejeng.2022.7.4.2851.
Pełny tekst źródłaOida, Kazumasa. "Uniqueness and Reproducibility of Traffic Signatures." Journal of Telecommunications and Information Technology, no. 4 (December 30, 2015): 44–53. http://dx.doi.org/10.26636/jtit.2015.4.984.
Pełny tekst źródłaMuraharirao, Siva Charan, and Manik Lal Das. "Digital Image Protection using Keyed Hash Function." International Journal of Computer Vision and Image Processing 2, no. 2 (2012): 36–47. http://dx.doi.org/10.4018/ijcvip.2012040103.
Pełny tekst źródłaAndreevskih, D. A., S. D. Razboynikov, M. P. Silich, and K. S. Sarin. "Comparing the use of local and global features of handwritten signatures for user authentication." Proceedings of Tomsk State University of Control Systems and Radioelectronics 23, no. 4 (2020): 30–34. http://dx.doi.org/10.21293/1818-0442-2020-23-4-30-34.
Pełny tekst źródłaTurcanu, Dinu, Serghei Popovici, and Tatiana Turcanu. "DIGITAL SIGNATURE: ADVANTAGES, CHALLENGES AND STRATEGIES." Journal of Social Sciences III (4) (December 15, 2020): 62–72. https://doi.org/10.5281/zenodo.4296327.
Pełny tekst źródłaCheng, Huayang, Yang Li, Jing Yan, Dan Wang, Liangyu Dong, and Junjie Gu. "A security algorithm based on SM9 for interdomain communication." Journal of Physics: Conference Series 2906, no. 1 (2024): 012007. https://doi.org/10.1088/1742-6596/2906/1/012007.
Pełny tekst źródłaPrakash, Gautam S., and Shanu Sharma. "Offline Signature Verification and Forgery Detection Based on Computer Vision and Fuzzy Logic." IAES International Journal of Artificial Intelligence (IJ-AI) 3, no. 4 (2014): 156. http://dx.doi.org/10.11591/ijai.v3.i4.pp156-165.
Pełny tekst źródłaSangdiah, Nana Suarna, Irfan Ali, and Dendy Indriya Efendi. "Authenticity Accuracy Improvement Through the Analysis of Signature Ownership Using Convolutional Neural Network Algorithm." Journal of Artificial Intelligence and Engineering Applications (JAIEA) 4, no. 2 (2025): 1289–93. https://doi.org/10.59934/jaiea.v4i2.900.
Pełny tekst źródłaK N, Madhu, and Mrs Bhavana G. "Signature Recognition for Banking System." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (2022): 1555–58. http://dx.doi.org/10.22214/ijraset.2022.45500.
Pełny tekst źródłaAl-Tamimi, Abdel-Karim, Asseel Qasaimeh, and Kefaya Qaddoum. "Offline signature recognition system using oriented FAST and rotated BRIEF." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 5 (2021): 4095. http://dx.doi.org/10.11591/ijece.v11i5.pp4095-4103.
Pełny tekst źródłaAbdel-Karim, Al-Tamimi, Qasaimeh Asseel, and Qaddoum Kefaya. "Offline signature recognition system using oriented FAST and rotated BRIEF." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 5 (2021): 4095–103. https://doi.org/10.11591/ijece.v11i5.pp4095-4103.
Pełny tekst źródłaQiu, Shi, Fengchang Fei, and Ying Cui. "Offline Signature Authentication Algorithm Based on the Fuzzy Set." Mathematical Problems in Engineering 2021 (March 18, 2021): 1–8. http://dx.doi.org/10.1155/2021/5554341.
Pełny tekst źródłaChande, Manoj Kumar, Cheng-Chi Lee, and Chun-Ta Li. "A New Self-Certified Convertible Authenticated Encryption Scheme Based on Discrete Logarithm Problem." Parallel Processing Letters 26, no. 04 (2016): 1650018. http://dx.doi.org/10.1142/s0129626416500183.
Pełny tekst źródłaLi, Fengyin, Junhui Wang, Mengxue Shang, Dandan Zhang, and Tao Li. "Research on Quantum-Attack-Resistant Strong Forward-Secure Signature Schemes." Entropy 25, no. 8 (2023): 1159. http://dx.doi.org/10.3390/e25081159.
Pełny tekst źródłaSeo, Seog Chung, and Taek-Young Youn. "TLDA: An Efficient Two-Layered Data Authentication Mechanism for Content-Centric Networking." Security and Communication Networks 2018 (July 4, 2018): 1–17. http://dx.doi.org/10.1155/2018/5429798.
Pełny tekst źródłaZhou, Quan, Yulong Zheng, Kaijun Wei, Minhui Chen, and Zhikang Zeng. "A Multi-Party Functional Signatures Scheme for Private Blockchain." Cryptography 7, no. 2 (2023): 21. http://dx.doi.org/10.3390/cryptography7020021.
Pełny tekst źródłaNadimi Goki, Pantea, Thomas Teferi Mulugeta, Roberto Caldelli, and Luca Potì. "Optical Systems Identification through Rayleigh Backscattering." Sensors 23, no. 11 (2023): 5269. http://dx.doi.org/10.3390/s23115269.
Pełny tekst źródłaBojič Burgos, Jay, and Matevž Pustišek. "Decentralized IoT Data Authentication with Signature Aggregation." Sensors 24, no. 3 (2024): 1037. http://dx.doi.org/10.3390/s24031037.
Pełny tekst źródłaTehsin, Sara, Ali Hassan, Farhan Riaz, Inzamam Mashood Nasir, Norma Latif Fitriyani, and Muhammad Syafrudin. "Enhancing Signature Verification Using Triplet Siamese Similarity Networks in Digital Documents." Mathematics 12, no. 17 (2024): 2757. http://dx.doi.org/10.3390/math12172757.
Pełny tekst źródłaNadzifarin, Aulia, and Asmunin Asmunin. "Penerapan Elliptic Curve Digital Signature Algorithm pada Tanda Tangan Digital dengan Studi Kasus Dokumen Surat – Menyurat." Journal of Informatics and Computer Science (JINACS) 4, no. 01 (2022): 1–9. http://dx.doi.org/10.26740/jinacs.v4n01.p1-9.
Pełny tekst źródłaDiksha Singh, Dileep Kumar, and Poonam Prakash. "Analysis of Signature Patterns: Consistency and Distinctiveness in Handwritten Signatures for Forensic Authentication." Indian Journal of Forensic Medicine & Toxicology 18, no. 1 (2024): 26–34. http://dx.doi.org/10.37506/c15rg139.
Pełny tekst źródłaKurowski, Mariusz, Andrzej Sroczyński, Georgis Bogdanis, and Andrzej Czyżewski. "An Automated Method for Biometric Handwritten Signature Authentication Employing Neural Networks." Electronics 10, no. 4 (2021): 456. http://dx.doi.org/10.3390/electronics10040456.
Pełny tekst źródłaKokku, Sai Anoushka, Akila Telugu, Sreeja Kompelly, Mallikarjuna Rao Gundavarapu, and Sneha Nimmala. "Performance Analysis of Deep Learning Approaches for Offline Signature Verification." International Journal of Engineering and Advanced Technology 11, no. 4 (2022): 94–99. http://dx.doi.org/10.35940/ijeat.d3482.0411422.
Pełny tekst źródłaMallikarjuna, Rao Gundavarapu, Kompelly Sreeja, Anoushka Kokku Sai, Telugu Akila, and Nimmala Sneha. "Performance Analysis of Deep Learning Approaches for Offline Signature Verification." International Journal of Engineering and Advanced Technology (IJEAT) 12, no. 4 (2022): 94–99. https://doi.org/10.35940/ijeat.D3482.0411422.
Pełny tekst źródłaTsanta Christelle Nadège Ralaibozaka, Maminiaina Alphonse Rafidison, and Hajasoa Malalatiana Ramafiarisona. "CONTRIBUTION TO THE AUTHENTICITY OF DIGITIZED HANDWRITTEN SIGNATURES THROUGH DEEP LEARNING WITH RESNET-50 AND OCR." International Journal of Innovations in Engineering Research and Technology 11, no. 3 (2024): 20–25. http://dx.doi.org/10.26662/ijiert.v11i3.pp20-25.
Pełny tekst źródłaLu, Xiuhua, Wei Yin, Qiaoyan Wen, Kaitai Liang, Liqun Chen, and Jiageng Chen. "Message Integration Authentication in the Internet-of-Things via Lattice-Based Batch Signatures." Sensors 18, no. 11 (2018): 4056. http://dx.doi.org/10.3390/s18114056.
Pełny tekst źródłaVijayaragavan, Arun, J. Visumathi, and K. L. Shunmuganathan. "Cubic Bezier Curve Approach for Automated Offline Signature Verification with Intrusion Identification." Mathematical Problems in Engineering 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/928039.
Pełny tekst źródłaBeck, Gabrielle, Arka Rai Choudhuri, Matthew Green, Abhishek Jain, and Pratyush Ranjan Tiwari. "Time-Deniable Signatures." Proceedings on Privacy Enhancing Technologies 2023, no. 3 (2023): 79–102. http://dx.doi.org/10.56553/popets-2023-0071.
Pełny tekst źródłaSubpratatsavee, Puchong, and Wissawat Sakulsaknimit. "HC2D Barcode for Handwritings Verification Using Embedded Camera on Tablet." Applied Mechanics and Materials 752-753 (April 2015): 1069–72. http://dx.doi.org/10.4028/www.scientific.net/amm.752-753.1069.
Pełny tekst źródłaYang, Chengjun, Jiansheng Peng, Yong Xu, Qingjin Wei, Ling Zhou, and Yuna Tang. "Edge Computing-Based VANETs’ Anonymous Message Authentication." Symmetry 14, no. 12 (2022): 2662. http://dx.doi.org/10.3390/sym14122662.
Pełny tekst źródłaKhurana, Rupali, and Ekta Narwal. "Analysis of code-based digital signature schemes." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 5 (2023): 5534–41. https://doi.org/10.11591/ijece.v13i5.pp5534-5541.
Pełny tekst źródłaChubaievskyi, Vitalii, Nataliia Lutska, Tetyana Savchenko, Lidiia Vlasenko, and Kyrylo Synelnyk. "ENHANCED CRYPTOGRAPHIC SECURITY OF AGGREGATED DIGITAL SIGNATURES THROUGH UTILIZATION OF A UNIFIED AUTHENTICATION FRAMEWORK." Cybersecurity: Education, Science, Technique 2, no. 22 (2023): 39–53. http://dx.doi.org/10.28925/2663-4023.2023.22.3953.
Pełny tekst źródłaM, Azees, Arun Sekar Rajasekaran, and Muhammad Islam Satti. "An Anonymous Signature-Based Authentication and Key Agreement Scheme for Vehicular Ad Hoc Networks." Security and Communication Networks 2022 (July 18, 2022): 1–9. http://dx.doi.org/10.1155/2022/1222660.
Pełny tekst źródłaDr. S. Gomathi alias Rohini and K. R. Amuruthavarshini Priya. "Offline Signature Verification System using Convolutional Neural Networks." International Journal of Linguistics Applied Psychology and Technology (IJLAPT) 2, no. 03(Mar) (2025): 37–46. https://doi.org/10.69889/ijlapt.v2i03(mar).105.
Pełny tekst źródłaM Ranga Swamy. "CNN Versus Conditional Generative Adversarial Network cGAN–Digital Signature Authentication: Case Study." Journal of Information Systems Engineering and Management 10, no. 14s (2025): 396–412. https://doi.org/10.52783/jisem.v10i14s.2309.
Pełny tekst źródłaShang, Pei Ni, and Zhu Lian Gao. "An Authentication Scheme Based on the Light-Weight Rainbow Signature for Wireless Sensor Network." Applied Mechanics and Materials 519-520 (February 2014): 185–88. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.185.
Pełny tekst źródłaZhao, Run, Dong Wang, Qian Zhang, Xueyi Jin, and Ke Liu. "Smartphone-based Handwritten Signature Verification using Acoustic Signals." Proceedings of the ACM on Human-Computer Interaction 5, ISS (2021): 1–26. http://dx.doi.org/10.1145/3488544.
Pełny tekst źródłaSuhardi, Suhardi. "Use of QRCode and Digital Signature Using The DSA Method to Authenticate Student Academic Documents." Journal of Computer Networks, Architecture and High Performance Computing 6, no. 4 (2024): 1913–21. http://dx.doi.org/10.47709/cnahpc.v6i4.4765.
Pełny tekst źródłaWellem, Theophilus, Yessica Nataliani, and Ade Iriani. "Academic Document Authentication using Elliptic Curve Digital Signature Algorithm and QR Code." JOIV : International Journal on Informatics Visualization 6, no. 3 (2022): 667. http://dx.doi.org/10.30630/joiv.6.2.872.
Pełny tekst źródłaHAN, Songshen, Kaiyong XU, Zhiqiang ZHU, Songhui GUO, Haidong LIU, and Zuohui LI. "Hash-Based Signature for Flexibility Authentication of IoT Devices." Wuhan University Journal of Natural Sciences 27, no. 1 (2022): 1–10. http://dx.doi.org/10.1051/wujns/2022271001.
Pełny tekst źródłaDamanik, Abdi Rahim, Dedy Hartama, Sumarno Sumarno, and Indra Gunawan. "Sistem Presensi Pegawai Berbasis Digital Signatures Dan Gps Location." DIKE : Jurnal Ilmu Multidisiplin 1, no. 1 (2023): 30–36. http://dx.doi.org/10.69688/dike.v1i1.11.
Pełny tekst źródłaTanvir, Kazi. "Signature Verification System: Using Big Transfer (BiT-M-R50x1) for Accurate Authentication." Aug-Sept 2023, no. 35 (September 7, 2023): 10–19. http://dx.doi.org/10.55529/jipirs.35.10.19.
Pełny tekst źródła