Proceedings ArticleDOI
Digital Signature
Ravneet Kaur,Amandeep Kaur +1 more
- pp 295-301
TLDR
This paper describes the different key factor of digital signature with the working ofdigital signature, through various methods and procedures involved in signing the data or message by using digital signature, and introduces algorithms used in digital signatures.Abstract:
There are different types of encryption techniques are being used to ensure the privacy of data transmitted over internet. Digital Signature is a mathematical scheme which ensures the privacy of conversation, integrity of data, authenticity of digital message/sender and non-repudiation of sender. Digital Signature is embedded in some hardware device or also exits as a file on a storage device. Digital Signature are signed by third party some certifying authority. This paper describe the different key factor of digital signature with the working of digital signature, through various methods and procedures involved in signing the data or message by using digital signature. It introduces algorithms used in digital signatures.read more
Citations
More filters
Book ChapterDOI
Note du Secrétariat
TL;DR: Aux termes de l'Article 102 de the Charte des Nations Unies, tout traite ou accord international conclu par un Membre des Nations UNies apres l'entree en vigueur de la Charte sera, le plus tot possible, enregistre au Secretariat and publie par lui as discussed by the authors.
Journal ArticleDOI
Hashing Techniques: A Survey and Taxonomy
Lianhua Chi,Xingquan Zhu +1 more
TL;DR: This survey reviews and categorizes existing hashing techniques as a taxonomy, in order to provide a comprehensive view of mainstream hashing techniques for different types of data and applications.
Journal ArticleDOI
Privacy-Preserving Attribute-Based Access Control Model for XML-Based Electronic Health Record System
TL;DR: A cloud-based EHR model that performs attribute-based access control using extensible access control markup language, focused on security, performs partial encryption and uses electronic signatures when a patient’s document is sent to a document requester.
Proceedings ArticleDOI
Analysis of Identity Management Systems Using Blockchain Technology
TL;DR: This paper investigates and gives analysis of the most popular Identity Management Systems using Blockchain: uPort, Sovrin, and ShoCard, and evaluates them under a set of features of digital identity that characterizes the successful of an Identity Management solution.
Journal ArticleDOI
A Novel Image Authentication with Tamper Localization and Self-Recovery in Encrypted Domain Based on Compressive Sensing
Rui Zhang,Di Xiao,Yanting Chang +2 more
TL;DR: The experimental results show that the proposed tamper detection, localization, and recovery scheme can not only distinguish the type of tamper and find the tampered blocks but also recover the main information of the original image.
References
More filters
Book
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Bruce Schneier,Phil Sutherland +1 more
TL;DR: This document describes the construction of protocols and their use in the real world, as well as some examples of protocols used in the virtual world.
Book
Integrity primitives for secure information systems : final report of RACE Integrity Primitives Evaluation RIPE-RACE 1040
Antoon Bosselaers,Bart Preneel +1 more
TL;DR: The MDC-4, RIPEMD, RIPE-MAC, IBC-hash, SKID, RSA, COMSET, and RSA key generation guidelines for arithmetic computation are described.