نتایج جستجو برای: qualifications for secured electronic signature
تعداد نتایج: 10439479 فیلتر نتایج به سال:
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
How can different types of electronic commerce be secured economically against different threats? How can it be avoided that players will have a variety of security instruments on their computers, with different interfaces? How can existing insecure computers be used for producing digital signatures as well as secure implementations compliant with legislation? This paper tries to answer these q...
Biometrics is a growing technology, which has been widely used in forensics, secured access and prison security. A biometric system is fundamentally a pattern recognition system that recognizes a person by determining the authentication by using his different biological features i.e. Fingerprint, retina-scan, iris scan, hand geometry, and face recognition are leading physiological biometrics an...
We outline the fundamental properties of a highly participatory rapid learning system that can be developed in part from meaningful use of electronic health records (EHRs). Future widespread adoption of EHRs will make increasing amounts of medical information available in computable form. Secured and trusted use of these data, beyond their original purpose of supporting the health care of indiv...
Abstract With the development of e-commerce, choosing a proper electronic payment method has become more and more important. Competing with other payment methods on the Internet, electronic cash has much more attractive properties, such as anonymity and off-line payment, and is generally considered as an ideal electronic payment method. However, the traceability of the customer or the cash in c...
The apparition of some laws that make the electronic signature (e-signature) legally equivalent to handwritten signature (under some circumstances) has favoured its use in different fields such as e-commerce, e-government, etc. In these fields, some signed documents have to be stored and remain valid over long periods of time. For this kind of e-signatures some formats such as CAdES and XAdES h...
Many texture-segmentation schemes use an elaborate bank of filters to decompose a textured image into a joint spacehpatial-frequency representation. Although these schemes show promise, and although some analytical work work has been done, the relationship between texture differences and the filter configurations required to distinguish them remain largely unknown. This paper examines the issue...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید