2020
DOI: 10.1007/978-981-15-7834-2_68
|View full text |Cite
|
Sign up to set email alerts
|

Multi Data Driven Validation of E-Document Using Concern Authentic Multi-signature Combinations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 8 publications
0
0
0
Order By: Relevance
“…While the personal and public keys are intrinsically connected, planned measures are taken to ensure their dissimilarity, stopping the publicity of the personal key from the public key [17]. In this context, senders need to percentage their public keys with recipients to enable the verification of message authenticity [18]. Recognizing the project posed by means of traditional virtual signature techniques, wherein signatures can become excessively lengthy, the methodology addresses this problem via employing cryptographic hash capabilities [19].…”
Section: Sha-256 Integrated Digital Signature Algorithm (Sha-256+dsa)mentioning
confidence: 99%
“…While the personal and public keys are intrinsically connected, planned measures are taken to ensure their dissimilarity, stopping the publicity of the personal key from the public key [17]. In this context, senders need to percentage their public keys with recipients to enable the verification of message authenticity [18]. Recognizing the project posed by means of traditional virtual signature techniques, wherein signatures can become excessively lengthy, the methodology addresses this problem via employing cryptographic hash capabilities [19].…”
Section: Sha-256 Integrated Digital Signature Algorithm (Sha-256+dsa)mentioning
confidence: 99%