Skip to main content
El presente artículo da cuenta de la regulación en el ordenamiento jurídico colombiano sobre el funcionamiento de la rama judicial por medios electró- nicos1 como una forma de hacer efectivo el cumplimiento de principios procesales como... more
    • by 
    •   12  
      Digital SignatureComputer technologyConstitutional ConflictsElectronic mail
Owing to features of open medium, absence of infrastructure, dynamic network topology, cooperative algorithms, lack of centralized monitoring and resource constraints, ad hoc networks are vulnerable to many kinds of attacks, among which... more
    • by 
    •   9  
      Digital SignatureRouting algorithmMobile Ad Hoc NetworkAd hoc network
    • by 
    •   9  
      Computer ScienceIntellectual PropertyInformation SecurityDigital Signature
Security of the consumer’s data over internet is the major problem in present time. In this paper we have analyzed blind signature schemes based on RSA and with taking advantage of elliptic curve cryptography to achieve the security... more
    • by 
    •   6  
      Computer ScienceSecurityDigital SignatureECC
    • by 
    •   15  
      Information RetrievalDigital SignatureXMLAccess Control
Signature is a written depiction of someone’s full name, nickname, or a simple letter that has been used on any desired document as an indication of their identity. It is a particular case of handwriting, which includes flourishes and... more
    • by 
    •   3  
      Digital SignatureSignature VerificationHandwritten Signature Verification
    • by 
    •   3  
      PrivacyDigital SignatureSmart Cards
    • by 
    •   7  
      Digital SignatureInformation Security and AssuranceJava CardPublic key cryptography
    • by 
    •   12  
      PrivacyDigital SignatureInternet BankingCryptography
    • by 
    •   3  
      Computer ScienceDigital SignatureComputer Virus
    • by 
    •   14  
      Computer ScienceDistributed ComputingDecision MakingDigital Signature
    • by  and +1
    •   8  
      Computer ScienceInformation TechnologyInformation SecurityDigital Signature
    • by 
    •   2  
      Computer ScienceDigital Signature
    • by 
    •   18  
      EngineeringTechnologyImage ProcessingSignal Processing
    • by 
    •   6  
      Digital SignatureHospital Information SystemInformation ExchangeValidity and Reliability
... Nick Pope • Security & Standards Associates Juan Carlos Cruellas • Universitat Politècnica de Catalunya Page 2. What Does Oasis DSS Do? ... The user sends a request through a secure chan-nel for the server to verify the signed... more
    • by 
    •   5  
      Distributed ComputingDigital SignaturePublic Key InfrastructureKey Management
    • by 
    •   2  
      Digital SignatureE Commerce
The Italian Legislation on Digital Signatures and the Role of Italian Banks as Certificate Authorities: A Strategic Analysis......................... ....................................................................................... more
    • by 
    •   6  
      Digital SignatureLegislationBanking SectorCertificate Authority
Most prior designated confirmer signature schemes either prove security in the random oracle model (ROM) or use general zero-knowledge proofs for NP statements (making them impractical). By slightly modifying the definition of designated... more
    • by 
    •   8  
      Digital SignatureModelingCryptographyEncryption
We present an algorithm for the Merkle tree traversal problem which combines the efficient space-time trade-off from the fractal Merkle tree [3] and the space efficiency from the improved log space-time Merkle trees traversal [8]. We give... more
    • by 
    •   6  
      AlgorithmsDigital SignatureCryptographyHash-Based Algorithm
In quest’opera si affronterà il tema delle firme elettroniche. Rispetto all’attuale stato dell’arte si è, però, prescelto un diverso angolo prospettico. Il corretto inquadramento dell’istituto delle firme elettroniche richiede di avviare... more
    • by 
    •   4  
      Digital SignatureElectronic SignaturesFirma DigitaleFirme Elettroniche
    • by 
    •   12  
      Digital SignatureRisk ManagementSecurity ManagementDistributed Data Mining
Maintenance of land records, processing of mutations and delivery and access of documents are key areas which have been revamped as a result of successful Computerisation of Land Records project. Efforts have been also made to share data;... more
    • by 
    •   5  
      Digital SignatureXMLAuthenticationPKI
Tujuan penelitian adalah untuk menganalisis implementasi Kebijakan D'SIGN : Dukcapil's Signature Electronic (TTE Dukcapil) pada Layanan Adminduk di jajaran Kemendagri untuk Mewujudkan Dynamic Governance.
    • by 
    •   2  
      Digital SignatureAdministrasi Kependudukan
    • by 
    •   6  
      AlgorithmsDigital SignatureCryptographyHash-Based Algorithm
Like all bulk exporters, Portman Iron Ore relies on a legal document, called a Bill of Lading, to prove ownership of the goods while being shipped. This paper investigates the practical aspects of the use of digital signatures if Portman... more
    • by 
    •   2  
      Digital SignatureIron
This article explains what is a Digital Signature, why it is an important part of the Digital Identity, and how it works. Then it describes the authenticity and social problems related to the usage of the Digital Signature. It explains as... more
    • by 
    •   10  
      PKI (Cryptography)Digital SignaturePublic Key InfrastructureAuthentication
We have developed a secure, collaborative, web-based electronic notebook (EN) designed to provide researchers and students with a means to record and share their primary research notes and data. The Pacific Northwest National Laboratory... more
    • by 
    •   5  
      Digital SignaturePacific NorthwestCollaborative SystemScientific Research
    • by  and +1
    •   6  
      Distributed ComputingDigital SignaturePublic Key InfrastructureCommunication model
امروزه سوء استفاده در تبادل اطلاعات تحت اینترنت و شبکه به امری متداول تبدیل شده است، و با توجه به نحوه عملکرد آنها شناسایی هویت فرد ارسال کننده‌ی یک پیام بسیار مشکل و در برخی موارد غیر ممکن است. تشخیص غیر جعلی بودن متون الکترونیکی در... more
    • by 
    •   2  
      Network SecurityDigital Signature
Page 1. Symmetric Cryptosystem Based on Data Encryption Standard Integrating HMAC and Digital Signature Scheme Implemented in Multi-Cast Messenger Application Don Jomar S. Hombrebueno Ma. Gracia Corazon E. Sicat Jasmin D. Niguidula Enrico... more
    • by 
    •   8  
      Information SecurityDigital SignatureCryptographyKey Management
Biometrics, which refers to identifying an individual based on his or her physiological or behavioral characteristics, has the capabilities to the reliably distinguish between an authorized person and an imposter. The Signature... more
    • by 
    •   3  
      Digital SignatureImage Processing, OCR, Pattern RecognitonOffline Signature Verification _recognition
    • by  and +1
    •   77  
      MarketingPublic AdministrationPrivacyManufacturing
Due to the rapid growth of online transactions on the Internet, authentication, non-repudiation and integrity are very essential security requirements for a secure transaction. To achieve these security goals, digital signature is the... more
    • by 
    •   6  
      Computer ScienceInformation SecurityDigital SignatureECDSA
A novel definition of stability regions and a new method for detecting them from on-line signatures is introduced in this paper. Building upon handwriting generation and motor control studies, the stability regions is defined as the... more
    • by 
    •   8  
      Computer ScienceDigital SignatureHandwritingForensic Document Examination
This paper tries to focus on the area of cyber law applicability in different area of intervention in life through network. The authenticity of digital document with help of different digital or electronic signature whether is admissible... more
    • by 
    • Digital Signature
Dokumen perjanjian antara borrower dan lender pada P2P lending berbentuk dokumen elektronik. Namun, menjadi sebuah dilema ketika dokumen tersebut diperlukan sebagai alat bukti dalam pengadilan. Dikarenakan sebuah dokumen perlu dibubuhi... more
    • by  and +1
    •   3  
      Digital SignatureDigital EconomyP2p Lending
    • by 
    •   6  
      Digital SignatureHospital Information SystemInformation ExchangeValidity and Reliability
    • by 
    •   3  
      Digital SignatureE-votingHashing
Rumah makan Lesehan Damai merupakan salah satu rumah makan yang ada di kota Makassar. Saat ini seluruh transaksi masih di lakukan secara manual. Dimana semua proses pembelian dan penjualan masih menggunakan faktur dan nota yang di catat... more
    • by 
    •   10  
      Mobile TechnologyDigital SignatureDigital WatermarkingSteganography
    • by 
    •   3  
      Digital SignatureAuthenticationKey generation
    • by 
    •   2  
      Digital SignatureData Compression
    • by 
    •   2  
      Digital SignatureAuthentication
    • by 
    •   10  
      Digital SignatureJava ProgrammingJava CardSmart Card
    • by 
    •   2  
      Digital SignatureSchema Schnorr
Tulisan ini sekedar untuk memberikan pemahaman apa itu tanda tangan elektronik, mengingat diantara pembaca sekalian pasti sudah pernah menggunakan aplikasi pdf reader yang mungkin juga ada menu digital signature (tanda tangan... more
    • by 
    • Digital Signature
Lo studio consta di due parti. La prima attiene al rapporto tra informatica e teoria giuridica del documento (e segnatamente di quella parte che ne esamina le caratteristiche fisiche). La seconda tende alla ricostruzione dell'articolata... more
    • by 
    •   16  
      Digital SignatureInformation Technology LawDiritto Processuale CivileElectronic Documents
    • by 
    •   88  
      Information SystemsEngineeringPublic AdministrationDigital Divide
    • by 
    •   7  
      Digital SignatureQuantum CryptographyComputer science & Information TechnologyDigital Signatures
Kriptografi merupakan sebuah ilmu sekaligus seni untuk menjaga kerahasiaan pesan agar tetap aman. Kriptografi dengan algoritma kunci publik dapat digunakan pada digital signature dengan beberapa persyaratan yang harus dipenuhi. Digital... more
    • by 
    •   12  
      Digital SignatureEncryptionInformation System SecurityCrptography