2020
DOI: 10.1007/978-981-15-5258-8_79
|View full text |Cite
|
Sign up to set email alerts
|

Digital Signature Authentication for a Bank Using Asymmetric Key Cryptography Algorithm and Token Based Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2021
2021
2025
2025

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(15 citation statements)
references
References 9 publications
0
15
0
Order By: Relevance
“…A wireless network sensor monitoring system was proposed using block detection, crack detection, pipeline robot vehicle, and Arduino UNO-based technology to secure data security [12]. Digital signature authentication for banks using asymmetric key cryptography algorithms was proposed with the phone or email authentication to ensure the best security for the banking systems [13][15] [22].…”
Section: Existing Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…A wireless network sensor monitoring system was proposed using block detection, crack detection, pipeline robot vehicle, and Arduino UNO-based technology to secure data security [12]. Digital signature authentication for banks using asymmetric key cryptography algorithms was proposed with the phone or email authentication to ensure the best security for the banking systems [13][15] [22].…”
Section: Existing Methodsmentioning
confidence: 99%
“…The ratio Frequency Identi cation System is processed by intelligent bar code technology [13]. RFID is one of the most popular methods of automatic identi cation and data capture (AIDC).…”
Section: Ration Frequency Identi Cationmentioning
confidence: 99%
“…1. Public-Key Cryptography: Public-Key Cryptography (or asymmetric cryptography) utilizes a pair of keys, a public key, and a private key, to authenticate the user and get access to the data or message [36].…”
Section: Cryptographic Primitives In Bc Technologymentioning
confidence: 99%
“…The hash of MD5 is usually expressed as the 32 digit hexadecimal number. 54 This algorithm is designed by the professor of MIT named Ronald Rivest. As MD5 is the extension of the MD4 so the initialization and padding are the same in both mechanisms and execute on the 32 bit words.…”
Section: Diffie-hellman Algorithmmentioning
confidence: 99%
“…According to the internet standard (RFC 1321), MD5 is used in many applications for the security and integrity. The hash of MD5 is usually expressed as the 32 digit hexadecimal number 54 . This algorithm is designed by the professor of MIT named Ronald Rivest.…”
Section: Cryptographic Algorithmsmentioning
confidence: 99%