E-governance security via public key cryptography using elliptic curve cryptography

M Peeran, ARM Shanavas - Materials Today: Proceedings, 2022 - Elsevier
… calculations and its use in E-Governance security in various areas … algorithms mostly used
for secured transaction ie RSA and ECC. … convention dependent on ECDSA for savvy cards.” …

GLASS: A citizen-centric distributed data-sharing model within an e-governance architecture

O Lo, WJ Buchanan, S Sayeed, P Papadopoulos… - Sensors, 2022 - mdpi.com
… as in the trust and confidence in governmental transactions. … types of approaches to improved
e-governance are crucial for … , we instead chose to use Minifabric in order to alleviate this …

Blockchain-based user authentication in cloud governance model

A Biswas, A Roy - Intelligent Sustainable Systems: Proceedings of ICISS …, 2022 - Springer
application of Blockchain for authentication of end user during Cloud Governance transaction.
… protocol, we have applied Blockchain during electronic transaction which is discussed in …

Lightweight Technical Implementation of Single Sign‐On Authentication and Key Agreement Mechanism for Multiserver Architecture‐Based Systems

D Anand, V Khemchandani… - Security and …, 2021 - Wiley Online Library
… the Indian e-governance system to integrate all e-governance … which is using ECDSA (Elliptic
Curve Digital Signature … of the user for a single transaction or a specific session is called a …

Authentication of user in connected governance model

A Ghosh, T Das, S Majumder, A Roy - … , Revised Selected Papers, Part II 5, 2020 - Springer
application of proposed model. Figure 5 shows the Sequence Diagram of our proposed
Cloud Banking transaction… UML based modeling of ECDSA for secured and smart e-governance

A scheme based on ECDSA and its implementation for information security

GM Rao, KD Rao - International Journal of Engineering …, 2024 - inderscienceonline.com
… its implementation for image and audio security is lacking in the literature. Hence, this
paper has proposed a scheme based on ECDSA for text, image, and audio securitye-governance. …

[PDF][PDF] Research Article Lightweight Technical Implementation of Single Sign-On Authentication and Key Agreement Mechanism for Multiserver Architecture-Based …

D Anand, V Khemchandani, M Sabharawal… - 2021 - academia.edu
… for the Indian e-governance system to integrate all e-governance … which is using ECDSA
(Elliptic Curve Digital Signature … authentication and secure transaction operation framework for E…

A comprehensive study on digital signature

J Chandrashekhara, VB Anu… - … Journal of Innovative …, 2021 - papers.ssrn.com
… level of ECDSA which produces high level security with the help … can be applied during
transactions in EGovernance, E-… called identitybased if users use their identity based asymmetric …

[PDF][PDF] An Efficient And Secure Fingerprint Based Authentication Scheme Using Elliptic Curve Cryptography.

A Panja, S Mondal, A Islam, TK Ghosh, S Karforma - Webology, 2022 - webology.org
… fields of e-transactions, e-learning, e-governance, and so on, … of the user is used to generate
keys for the ECDSA system. … use of One-Time Password authentication in e-transactions to …

[PDF][PDF] e-Sign-An Online Digital Service: Evolving Trends & use Cases

SK Pandey, K Bhatia, J Bodhankar - academia.edu
… by various sectors including e-Governance and Finance. Many … RSA and ECDSA are common
examples of Asymmetric Key. … and key activation to ensure the security of the transaction. …