Andrei et al., 2023 - Google Patents
Methods for data validation using QR codesAndrei et al., 2023
View PDF- Document ID
- 3397503088180370005
- Author
- Andrei O
- Pitic E
- Crețulescu R
- Publication year
- Publication venue
- International Journal of Advanced Statistics and IT&C for Economics and Life Sciences
External Links
Snippet
This article aims to elaborate on a few strategies designed for validating data encoded as a QR code. As the use-cases for such validation schemes vary widely as the demand for such practices is continuously increasing, the present article will represent a comparative study of …
- 238000000034 method 0 title description 20
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Menezes et al. | Handbook of applied cryptography | |
Barker et al. | Recommendation for random number generation using deterministic random bit generators (revised) | |
US20200304316A1 (en) | Implicitly Certified Digital Signatures | |
US9698993B2 (en) | Hashing prefix-free values in a signature scheme | |
US8995656B2 (en) | Multiple hashing in a cryptographic scheme | |
US8892881B2 (en) | Split key secure access system | |
US8661240B2 (en) | Joint encryption of data | |
US9049022B2 (en) | Hashing prefix-free values in a certificate scheme | |
CN107251476A (en) | Secure Communications Management | |
GB2487503A (en) | Authentication of digital files and associated identities using biometric information | |
US20140082361A1 (en) | Data encryption | |
Pu et al. | Post quantum fuzzy stealth signatures and applications | |
Kasodhan et al. | A new approach of digital signature verification based on BioGamal algorithm | |
Rajasekar et al. | Introduction to classical cryptography | |
CN116108410A (en) | Identity credential generation method and device | |
Yue et al. | MBCT: A monero-based covert transmission approach with on-chain dynamic session key negotiation | |
Andrei et al. | Methods for data validation using QR codes | |
Chen et al. | A hill cipher‐based remote data possession checking in cloud storage | |
Jain et al. | Honey2fish-a hybrid encryption approach for improved password and message security | |
Oleksik et al. | Methods for data validation using QR codes | |
Suo et al. | Encryption technology in information system security | |
Banday | Easing PAIN with digital signatures | |
KR20150103394A (en) | Cryptography system and cryptographic communication method thereof | |
Vidhya | Network Security using Python | |
Anyapu et al. | Message Security Through Digital Signature Generation and Message Digest Algorithm |