M Pooja, M Yadav - International Journal of Scientific Research in …, 2018 - academia.edu
ABSTRACT The Information Technology Act 2000 (IT Act) dictates digital signatures as a means of authentication and security of electronic documents. Digital signature is an …
MA Nia, A Sajedi, A Jamshidpey - arXiv preprint arXiv:1404.2820, 2014 - arxiv.org
Today, all types of digital signature schemes emphasis on secure and best verification methods. Different digital signature schemes are used in order for the websites, security …
SR Subramanya, BK Yi - IEEE Potentials, 2006 - ieeexplore.ieee.org
Many traditional and newer businesses and applications have recently been carrying out enormous amounts of electronic transactions, which have led to a critical need for protecting …
K Ganeshkumar, D Arivazhagan - Indian Journal …, 2014 - sciresol.s3.us-east-2.amazonaws …
This paper analyzes the computer security of systems and importance of the digital signature and hashing message algorithm. The proposed digital signature algorithm gives a new …
V Jain, R Kumar, Z Saquib - Proceedings of the 2015 2nd international …, 2015 - dl.acm.org
Recent development in e-Governance would like to leverage digital signature capabilities, but facing challenges due to lack in user experience, technology and procedural challenges …
I Nurhaida, D Ramayanti, R Riesaputra - Int. Res. J. Comput. Sci, 2017 - academia.edu
A digital signature is a method that serves to improve the integrity, authenticity, non- repudiation, and confidentiality of digital data in transmission. This paper discusses digital …
As paper gives way to electronic mail, a secure means for validating and authenticating messages is required. The answer could be one of several digital signature schemes. In the …
M Atreya, S Paine, B Hammond, S Wu, P Starrett - 2002 - dl.acm.org
From the Publisher: Learn to implement digital signature applications successfully and conduct secure electronic transactions with help from this expert resource. Written by both …
AD Alrehily, AF Alotaibi, SB Almutairy… - Journal of information …, 2015 - scirp.org
Due to the rapid growth of online transactions on the Internet, authentication, non- repudiation and integrity are very essential security requirements for a secure transaction …