[PDF][PDF] A survey on digital signatures and its applications

A Roy, S Karforma - Journal of Computer and Information …, 2012 - academia.edu
The success rate of various electronic mechanisms such as E-Governance, E-Learning, E-
Shopping, E-Voting, etc. is absolutely dependent on the security, authenticity and the …

[PDF][PDF] Digital signature

M Pooja, M Yadav - International Journal of Scientific Research in …, 2018 - academia.edu
ABSTRACT The Information Technology Act 2000 (IT Act) dictates digital signatures as a
means of authentication and security of electronic documents. Digital signature is an …

An introduction to digital signature schemes

MA Nia, A Sajedi, A Jamshidpey - arXiv preprint arXiv:1404.2820, 2014 - arxiv.org
Today, all types of digital signature schemes emphasis on secure and best verification
methods. Different digital signature schemes are used in order for the websites, security …

Digital signatures

SR Subramanya, BK Yi - IEEE Potentials, 2006 - ieeexplore.ieee.org
Many traditional and newer businesses and applications have recently been carrying out
enormous amounts of electronic transactions, which have led to a critical need for protecting …

[PDF][PDF] Generating a digital signature based on new cryptographic scheme for user authentication and security

K Ganeshkumar, D Arivazhagan - Indian Journal …, 2014 - sciresol.s3.us-east-2.amazonaws …
This paper analyzes the computer security of systems and importance of the digital signature
and hashing message algorithm. The proposed digital signature algorithm gives a new …

Digital signatures: a tutorial survey

Aki - Computer, 1983 - ieeexplore.ieee.org
As paper gives way to electronic mail, a secure means for validating and authenticating
messages is required. The answer could be one of several digital signature schemes. In the …

[图书][B] Digital signatures

M Atreya, S Paine, B Hammond, S Wu, P Starrett - 2002 - dl.acm.org
From the Publisher: Learn to implement digital signature applications successfully and
conduct secure electronic transactions with help from this expert resource. Written by both …

[PDF][PDF] Data integrity and security of digital signatures on electronic systems using the digital signature algorithm (DSA)

A Saepulrohman, A Ismangil - Int. J. Electron. Commun. Syst, 2021 - repository.unpak.ac.id
The digital signature generation process begins with the creation of a public key and a
private key. A public key is generated and published to verify the signature and calculate the …

[HTML][HTML] Conventional and improved digital signature scheme: A comparative study

AD Alrehily, AF Alotaibi, SB Almutairy… - Journal of information …, 2015 - scirp.org
Due to the rapid growth of online transactions on the Internet, authentication, non-
repudiation and integrity are very essential security requirements for a secure transaction …

Digital signature algorithms

W Stallings - Cryptologia, 2013 - Taylor & Francis
In this article, the author describes three digital signature algorithms that have been
approved by the National Institute of Standards and Technology and which have also been …