Foster, 2022 - Google Patents
Study and Implementation of Algorithms for Digital Signatures in Network SecurityFoster, 2022
- Document ID
- 3299696236895389453
- Author
- Foster D
- Publication year
External Links
Snippet
One of the essential applications of Cybersecurity is to protect critical information on a user's computer and the network itself from unauthorized users. It is used to guarantee integrity, availability, and confidentiality. Cryptography is one of the tools in the cybersecurity area to …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Paquin et al. | U-prove cryptographic specification v1. 1 | |
US9800418B2 (en) | Signature protocol | |
CN109936456B (en) | Anti-quantum computation digital signature method and system based on private key pool | |
Shankar et al. | Improved multisignature scheme for authenticity of digital document in digital forensics using edward‐curve digital signature algorithm | |
US20140082361A1 (en) | Data encryption | |
US20060215837A1 (en) | Method and apparatus for generating an identifier-based public/private key pair | |
KR20240093465A (en) | Generation of shared key | |
US20150006900A1 (en) | Signature protocol | |
Waheed et al. | Novel blind signcryption scheme for e-voting system based on elliptic curves | |
Ullah et al. | An investigating study of blind and ID-based signcryption schemes for misuse risk protection and high performance computing | |
KR20240045231A (en) | Creation of digitally signed shares | |
Kumar et al. | An efficient implementation of digital signature algorithm with SRNN public key cryptography | |
Barker | Cryptographic Standards in the Federal Government: Cryptographic Mechanisms | |
Kumar et al. | Cryptanalysis and performance evaluation of enhanced threshold proxy signature scheme based on RSA for known signers | |
US20250125972A1 (en) | Generating digital signatures | |
WO2016187689A1 (en) | Signature protocol | |
Melina et al. | Digital signature authentication using Rivest-Shamir-Adleman cryptographic algorithm | |
Foster | Study and Implementation of Algorithms for Digital Signatures in Network Security | |
Tsaur | Secure communication for electronic business applications in mobile agent networks | |
Brickell et al. | ENHANCED PRIVACY ID: A REMOTE ANONYMOUS ATTESTATION SCHEME FOR HARDWARE DEVICES. | |
Wei et al. | A directed signature scheme and its application to group key initial distribution | |
Bashir | Analysis and Improvement of Some Signcryption Schemes Based on Elliptic Curve | |
Terrance et al. | In-depth Analysis of the Performance of RSA and ECC in Digital Signature Application | |
Verma et al. | ID-based multiuser signature schemes and their applications | |
Krishna | Providing Security to Confidential Information Using Digital signature |