Protection of integrity and ownership of pdf documents using invisible signature
Distributing digital document through insecure channel leads to the question of the integrity and the ownership of the file on the receiver’s side. Employing hash function and digital signature algorithms solves the difficulties of the receiver to proof the approval of the document from the sender...
| Main Authors: | Taha, Imad, Zeki, Akram M., Pathan, Al-Sakib Khan, makarim, rusydi |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
IEEE digital library
2012
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/22169/ http://irep.iium.edu.my/22169/1/1569575521%284%29.pdf |
Similar Items
A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents
by: M. Nomani, Kabir, et al.
Published: (2014)
by: M. Nomani, Kabir, et al.
Published: (2014)
On protecting data storage in mobile cloud computing paradigm
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
Towards privacy protection in smart grid
by: Zeadally, Sherali, et al.
Published: (2012)
by: Zeadally, Sherali, et al.
Published: (2012)
An automated signature generation method for zero-day polymorphic worms based on multilayer perceptron model
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2013)
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2013)
Invisible cusp and unintended outcomes : a response to two influential documents as heralds of computers in Tasmanian government schools
by: Jordan, Don
Published: (2009)
by: Jordan, Don
Published: (2009)
Protecting an Internet Web File using Java
by: Taha, Imad, et al.
Published: (2004)
by: Taha, Imad, et al.
Published: (2004)
Tackling the threats of Internet worms
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Editorial article: on the boundaries of trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Building customer trust in cloud computing model
by: Pathan, Al-Sakib Khan
Published: (2015)
by: Pathan, Al-Sakib Khan
Published: (2015)
Basics of security and cryptography
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Wireless sensor network security: Current status and future trends
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Fi-Wi Network for future cloud
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Analyzing trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Wireless network security: 3G, 4G, wireless PAN/LAN/MAN
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Editorial: when the cloud computing becomes mobile!
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Computer science and IT today: research issues and publication tips
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
IDPS: an integrated intrusion handling model for cloud computing environment
by: Alsafi, Hassen Mohammed, et al.
Published: (2012)
by: Alsafi, Hassen Mohammed, et al.
Published: (2012)
Two-dimensional barcodes for hardcopy document integrity verification
by: Teoh, Chin Yew
Published: (2008)
by: Teoh, Chin Yew
Published: (2008)
Protection of the digital holy Quran using IT techniques
by: Alahmad, Mohammad, et al.
Published: (2017)
by: Alahmad, Mohammad, et al.
Published: (2017)
Denial of service in wireless sensor networks: issues and challenges
by: Pathan, Al-Sakib Khan
Published: (2010)
by: Pathan, Al-Sakib Khan
Published: (2010)
Security management in heterogeneous distributed sensor networks
by: Pathan, Al-Sakib Khan
Published: (2011)
by: Pathan, Al-Sakib Khan
Published: (2011)
Where is the intelligence in computational intelligence?
by: Pathan, Al-Sakib Khan
Published: (2005)
by: Pathan, Al-Sakib Khan
Published: (2005)
Securing WSN with lightweight resource-efficient schemes
by: Pathan, Al-Sakib Khan
Published: (2011)
by: Pathan, Al-Sakib Khan
Published: (2011)
A review and cryptanalysis of similar timestamp-based password authentication schemes using smart cards
by: Pathan, Al-Sakib Khan
Published: (2010)
by: Pathan, Al-Sakib Khan
Published: (2010)
Protection of the texts using Base64 and MD5
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
Protection of text using SHA1 and Base64
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
Wireless Networks and Security: Issues, Challenges and Research Trends
by: Khan, Shafiullah, et al.
Published: (2012)
by: Khan, Shafiullah, et al.
Published: (2012)
Teaching and learning qur'anic Arabic utilizing adaptive and intelligent systems for collaborative learning (EDW B13-084-0969)
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
Crafting content: the discovery of Minecraft's invisible digital economy
by: Koutsouras, Panagiotis
Published: (2018)
by: Koutsouras, Panagiotis
Published: (2018)
Invisible-touch model: an integrative framework for postmerger integration
by: Yang, Monsol Zhengyin
Published: (2020)
by: Yang, Monsol Zhengyin
Published: (2020)
Protection of the digital holy Quran using SAB hash function
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
Guest editorial: Special issue on integration of IoT with future Internet
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
Information integrity in smart grid systems
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm
by: Nur Alya Afikah, Usop
Published: (2024)
by: Nur Alya Afikah, Usop
Published: (2024)
The need-to-know issues for publishing books and book chapters
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
On the key factors of usability in small-sized mobile touch-screen application
by: Gündüz, Feyza, et al.
Published: (2013)
by: Gündüz, Feyza, et al.
Published: (2013)
Automatic defense against zero-day polymorphic worms in communication networks
by: Mohammed, Mohssen, et al.
Published: (2013)
by: Mohammed, Mohssen, et al.
Published: (2013)
Usability improvements for touch-screen mobile flight booking application: a case study
by: Gündüz, Feyza, et al.
Published: (2012)
by: Gündüz, Feyza, et al.
Published: (2012)
Preventing persistent cross-site scripting (XSS) attack by applying pattern filtering approach
by: Yusof, Imran, et al.
Published: (2014)
by: Yusof, Imran, et al.
Published: (2014)
An innovative approach of blending security features in energy-efficient routing for a crowded network of wireless sensors
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
Similar Items
-
A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents
by: M. Nomani, Kabir, et al.
Published: (2014) -
On protecting data storage in mobile cloud computing paradigm
by: Abdalla , Al-kindy Athman, et al.
Published: (2014) -
Towards privacy protection in smart grid
by: Zeadally, Sherali, et al.
Published: (2012) -
An automated signature generation method for zero-day polymorphic worms based on multilayer perceptron model
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2013) -
Invisible cusp and unintended outcomes : a response to two influential documents as heralds of computers in Tasmanian government schools
by: Jordan, Don
Published: (2009)