public-key digital signature
Discrete cosine transformation, Elliptic curve digital signature algorithm, Image authentication, imperceptibility, JPEG, Public key cryptography.
6
Security Analysis of Digital Signature Scheme with Message Recovery using Self-Certified Public Keys
13
Enhanced Secured Wireless Message Communication using Digital Signature Algorithm (DSA)
10
Comparison of e-Voting Schemes: Estonian and Norwegian Solutions
7
Signed metadata: method and application
5
A Proposed Model for Data Privacy providing Legal Protection by E-Court
9
On the Security of a Digital Signature with Message Recovery Using Self-certified Public Key
14
An Efficient Blind Digital Signature Protocol Based on Elliptic Curve
14
A Digital Signature Scheme Based on Pell Equation
5
Introduction to Cryptography Principles & Applications, 2nd Ed pdf
372
Enhanced security for data transaction with public key Schnorr authentication and digital signature protocol
8
An Authenticated Transmission of Medical Image with Codebase Cryptosystem over Noisy Channel
5
Secure Proxy Digital Signature Scheme using Digital Signature Standard with Random Key Generation Process
6
What security and assurance standards does Trustis use for TMDCS certificate services?
5
IMPROVED APPROACH FOR INTRANET MAILING IN PRETTY GOOD PRIVACY (PGP)
6
Survey of One Time Signature Schemes on Cloud Computing
5
EdDSA Over Galois Field GF(p^m) for Multimedia Data
7
Secure Comparator: a ZKP-Based Authentication System
8
Misplaced Priorities: The Utah Digital Signature Act and Liability Allocation in a Public Key Infrastructure
52
Design of RSA Digital Signature Scheme Using A Novel Cryptographic Hash Algorithm
5