نتایج جستجو برای: qualifications for secured electronic signature

تعداد نتایج: 10439479  

2006
Shidi Xu

Mobile ad hoc network (MANET) has been generally regarded as an ideal network model for group communications. However, the security deployment for MANET routing operations is problematic. Firstly, existing secured routing protocols are deficient in achieving both authentication efficiency and full scale of security. In addition, the diversity of routing protocols presents difficulties in the ge...

2003
Miroslav Skrbek

This article is focused on signature dynamics that is used for protection of qualified electronic signature functions and personal data on mobile platforms. The article presents a concept of the Trusted Pocket Signer (trustworthy PDA with integrated SmartCard used as Secure Signature Creation Device (SSCD)), role of biometrics within this concept, and major handwritten signature algorithm strat...

2017
Manoj Kumar

In this modern age of electronic era, digital signature scheme is a latest and burning platform for researcher. A variety of digital signature schemes are available in the literature of cryptography. Different signature schemes are used according to the peculiar requirement/situations. A plenty of digital signature schemes have been proposed and discussed. This paper presents a directed signatu...

2002
Zuowen Tan Zhuojun Liu Chunming Tang

In a proxy signature scheme, a potential signer delegates his signing power to a proxy, who signs a message on behalf of the original signer. In a blind signature scheme, the signee cannot link the relationship between the blind message and the signature of the chosen message. That is, the signee cannot make a linkage between the blind signature and the identity of the requester. Therefore, it ...

2011
Sven Patzina Lars Patzina Andy Schürr

Driven by technical innovation, embedded systems are becoming increasingly interconnected and have to be secured against failures and threats from the outside world. For this purpose, we have defined an integrated model-based development process for security monitors which requires an expressive, formally well-defined, and easy to learn behavioral signature language. In this paper, we demonstra...

2013
Eung Jun Cho Choong Seon Hong Sungwon Lee Seokhee Jeon

The increasing use of wireless sensor networks, which normally comprise several very small sensor nodes, makes their security an increasingly important issue. They can be practically and efficiently secured using intrusion detection systems. Conventional security mechanisms are not usually applicable due to the sensor nodes having limitations of computational power, memory capacity, and battery...

Journal: :SHS web of conferences 2022

The purpose of Directive 1999/93 / EC on the Community framework for electronic signatures is to facilitate use signatures. Digital are incredibly important as they prevent fraud in e-commerce transactions. A legal established ensure smooth functioning internal market. This article aims interpret European digital Member States shall at least that, when issuing a certificate, certification body ...

Journal: :Zbornik radova Pravnog fakulteta Nis 2018

Journal: :Computers, materials & continua 2022

To provide faster access to the treatment of patients, healthcare system can be integrated with Internet Things prior and timely health services patient. There is a huge limitation in sensing layer as IoT devices here have low computational power, limited storage less battery life. So, this amount data needs stored on cloud. The information sensed by these made accessible internet from where me...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید