A digital signature system.
The present invention provides an apparatus and method for the creation of a digital signature by utilizing public key asymmetric encryption that utilizes private keys with a minimum length of 128 bits. In one aspect the present invention provides a method and apparatus for a digital signature syste...
| Main Authors: | Kamel Arrifin, Muhammad Rezal, Abu, Nor Azman |
|---|---|
| Format: | Patent |
| Language: | English |
| Published: |
2010
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/32099/ |
Similar Items
A new efficient Rabin-like signature scheme
by: Mahad, Zahari, et al.
Published: (2016)
by: Mahad, Zahari, et al.
Published: (2016)
Digital signature algorithm
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
Chaotic asymmetric encryption process for data security.
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2008)
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2008)
Novel forgery mechanisms in multivariate signature schemes
by: Abdul Jamal, Nurul Amiera Sakinah, et al.
Published: (2023)
by: Abdul Jamal, Nurul Amiera Sakinah, et al.
Published: (2023)
Cryptanalysis of the SHMW signature scheme
by: Lau, Terry Shue Chien, et al.
Published: (2024)
by: Lau, Terry Shue Chien, et al.
Published: (2024)
Generalized Scheme For Fractal Based Digital Signature (GFDS).
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
Verifying the authenticity of digital certificates
by: Kamel Ariffin, Muhammad Rezal
Published: (2021)
by: Kamel Ariffin, Muhammad Rezal
Published: (2021)
New identified strategies to forge multivariate signature schemes
by: Abdul Jamal, Nurul Amiera Sakinah, et al.
Published: (2022)
by: Abdul Jamal, Nurul Amiera Sakinah, et al.
Published: (2022)
Fractal attractor based digital signature
by: Al-Saidi, Nadia M. G., et al.
Published: (2010)
by: Al-Saidi, Nadia M. G., et al.
Published: (2010)
On the security of digital signature protocol based on iterated function systems.
by: M. G. AL-Saidi, Nadia, et al.
Published: (2011)
by: M. G. AL-Saidi, Nadia, et al.
Published: (2011)
Improved digital signature protocol using iterated function systems.
by: Al-Saidi, Nadia M.G., et al.
Published: (2011)
by: Al-Saidi, Nadia M.G., et al.
Published: (2011)
A New Digital Signature Scheme Based on Mandelbrot and Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
A Cryptosystem Analogous to LUCELG and a
Digital Signature Scheme
by: Yoong, Choo Mun, et al.
Published: (2005)
by: Yoong, Choo Mun, et al.
Published: (2005)
Stegano-image as a digital signature to improve security authentication system in mobile computing
by: Mantoro, Teddy, et al.
Published: (2016)
by: Mantoro, Teddy, et al.
Published: (2016)
Rank AGS identification scheme and signature scheme
by: Nagaraja, Vaishnavi, et al.
Published: (2023)
by: Nagaraja, Vaishnavi, et al.
Published: (2023)
Offline Handwritten Signature Watermark for Digital Document Authentication
by: Low, Cheng Yaw
Published: (2008)
by: Low, Cheng Yaw
Published: (2008)
Offline Handwritten Signature Watermark For Digital Document Authentication
by: Yaw, Low Cheng
Published: (2008)
by: Yaw, Low Cheng
Published: (2008)
Digital Signature-based authentication framework in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2012)
by: Parvin, Sazia, et al.
Published: (2012)
Digital signature-based secure communication in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011)
by: Parvin, Sazia, et al.
Published: (2011)
Glove-Based Approach to Online Signature Verification
by: Kamel, N.S., et al.
Published: (2008)
by: Kamel, N.S., et al.
Published: (2008)
SVD-based signature verification technique using data glove
by: Kamel , Nidal, et al.
Published: (2008)
by: Kamel , Nidal, et al.
Published: (2008)
Signature verification using data glove with prominent sensors
by: N.S., Kamel, et al.
Published: (2009)
by: N.S., Kamel, et al.
Published: (2009)
Glove-based approach to online signature verification
by: Nidal S., Kamel, et al.
Published: (2008)
by: Nidal S., Kamel, et al.
Published: (2008)
SVD-BASED SIGNATURE VERIFICATION TECHNIQUE USING DATA GLOVE
by: KAMEL, NIDAL S., et al.
Published: (2008)
by: KAMEL, NIDAL S., et al.
Published: (2008)
Online Signature Verification System
by: Fauziyah, Salehuddin, et al.
Published: (2009)
by: Fauziyah, Salehuddin, et al.
Published: (2009)
Dynamic signature verification system
by: Lim, Wai Loon
Published: (2011)
by: Lim, Wai Loon
Published: (2011)
Dynamic signature verification using sensor based data glove
by: N.S., Kamel, et al.
Published: (2007)
by: N.S., Kamel, et al.
Published: (2007)
Virtual reality based dynamic signature verification using data glove
by: N.S., Kamel, et al.
Published: (2007)
by: N.S., Kamel, et al.
Published: (2007)
A novel approach to dynamic signature verification using sensor-based data glove
by: N.S., Kamel, et al.
Published: (2009)
by: N.S., Kamel, et al.
Published: (2009)
A new proxy signature scheme as secure as EIGamal signature
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
AAβ-Cryptosystem: a chaos based public key cryptosystem
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
A novel psychovisual model on an independent video frame for an almost lossless compression
by: Abu, Nur Azman, et al.
Published: (2014)
by: Abu, Nur Azman, et al.
Published: (2014)
Virtual Reality Based Dynamic Signature Verification Using Data glove
by: Sayeed, Shohel, et al.
Published: (2007)
by: Sayeed, Shohel, et al.
Published: (2007)
Enhancement of glove-based approach to dynamic signature verification by reducing number of sensors
by: N.S., Kamel, et al.
Published: (2008)
by: N.S., Kamel, et al.
Published: (2008)
A New Proxy Signature Scheme As Secure As ElGamal Signature
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents
by: M. Nomani, Kabir, et al.
Published: (2014)
by: M. Nomani, Kabir, et al.
Published: (2014)
The application of the digital signature laws in governing internet banking security in Malaysia : with special reference to the EU directive and the UK laws on electronic signature / Hartini Saripan
by: Saripan, Hartini
Published: (2012)
by: Saripan, Hartini
Published: (2012)
The Signature at Ludlow
by: Kinsella, John
Published: (2010)
by: Kinsella, John
Published: (2010)
Enhancement of Glove-Based Approach to Dynamic Signature Verification by Reducing Number of Sensors
by: Shohel, Sayeed, et al.
Published: (2008)
by: Shohel, Sayeed, et al.
Published: (2008)
Application of digital image processing to detect transformer bushing faults and oil degradation using FRA polar plot signature
by: Aljohani, O., et al.
Published: (2017)
by: Aljohani, O., et al.
Published: (2017)
Similar Items
-
A new efficient Rabin-like signature scheme
by: Mahad, Zahari, et al.
Published: (2016) -
Digital signature algorithm
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011) -
Chaotic asymmetric encryption process for data security.
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2008) -
Novel forgery mechanisms in multivariate signature schemes
by: Abdul Jamal, Nurul Amiera Sakinah, et al.
Published: (2023) -
Cryptanalysis of the SHMW signature scheme
by: Lau, Terry Shue Chien, et al.
Published: (2024)