[go: up one dir, main page]

Foster, 2022 - Google Patents

Study and Implementation of Algorithms for Digital Signatures in Network Security

Foster, 2022

Document ID
3299696236895389453
Author
Foster D
Publication year

External Links

Snippet

One of the essential applications of Cybersecurity is to protect critical information on a user's computer and the network itself from unauthorized users. It is used to guarantee integrity, availability, and confidentiality. Cryptography is one of the tools in the cybersecurity area to …
Continue reading at search.proquest.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Similar Documents

Publication Publication Date Title
Paquin et al. U-prove cryptographic specification v1. 1
US9800418B2 (en) Signature protocol
CN109936456B (en) Anti-quantum computation digital signature method and system based on private key pool
Shankar et al. Improved multisignature scheme for authenticity of digital document in digital forensics using edward‐curve digital signature algorithm
US20140082361A1 (en) Data encryption
US20060215837A1 (en) Method and apparatus for generating an identifier-based public/private key pair
KR20240093465A (en) Generation of shared key
US20150006900A1 (en) Signature protocol
Waheed et al. Novel blind signcryption scheme for e-voting system based on elliptic curves
Ullah et al. An investigating study of blind and ID-based signcryption schemes for misuse risk protection and high performance computing
KR20240045231A (en) Creation of digitally signed shares
Kumar et al. An efficient implementation of digital signature algorithm with SRNN public key cryptography
Barker Cryptographic Standards in the Federal Government: Cryptographic Mechanisms
Kumar et al. Cryptanalysis and performance evaluation of enhanced threshold proxy signature scheme based on RSA for known signers
US20250125972A1 (en) Generating digital signatures
WO2016187689A1 (en) Signature protocol
Melina et al. Digital signature authentication using Rivest-Shamir-Adleman cryptographic algorithm
Foster Study and Implementation of Algorithms for Digital Signatures in Network Security
Tsaur Secure communication for electronic business applications in mobile agent networks
Brickell et al. ENHANCED PRIVACY ID: A REMOTE ANONYMOUS ATTESTATION SCHEME FOR HARDWARE DEVICES.
Wei et al. A directed signature scheme and its application to group key initial distribution
Bashir Analysis and Improvement of Some Signcryption Schemes Based on Elliptic Curve
Terrance et al. In-depth Analysis of the Performance of RSA and ECC in Digital Signature Application
Verma et al. ID-based multiuser signature schemes and their applications
Krishna Providing Security to Confidential Information Using Digital signature