ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Education
Communication
Social Sciences
Technology
Literature
Research
Architecture and Urbanism
Computing
Languages
Economy
all records (72)

Languages
English
Spanish
Portuguese
German

Countries
Indonesia
Brazil
USA
Spain
Canada
Ecuador
Ukraine
Denmark
Germany
United Kingdom
all records (69)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
38.579  Articles
1 of 3.859 pages  |  10  records  |  more records»
Abstract. Purpose: This study aims to build an effective user interface digital signature application for document legalization.Methods: The process of document publishing services and bureaucratic flows at universities affected by the pandemic can be sim... see more

In the uncertainty conditions due to the Covid-19 pandemic, every businesses and public services, also applied for cyber notary, the officials who make authentic deeds. This researc is a normative legal research, using secondary data and primary data. The... see more

In the uncertainty conditions due to the Covid-19 pandemic, every businesses and public services, also applied for cyber notary, the officials who make authentic deeds. This researc is a normative legal research, using secondary data and primary data. The... see more

This paper is presenting a new image forgery detection technique. The proposed technique makes use of digital signatures, it generates a digital signature for each column and embeds the signature in the least significant bits of selected pixels of each co... see more

The number of crimes committed by utilizing advances in information technology such as information leakage, embezzlement of money in banks, credit card fraud, pornography, terrorism, drug trafficking and many more are definitely related to the name digita... see more

Several batch verication multiple digital signatures are reviewed in this paper. These schemes use only one verification instead of several verifications. Weakness of these schemes is also pointed out. The schemes were compared by the defined criterions.

Security of information at this point becomes easier to be abused by another party when that information is sent and stored. To overcome these problems then do research to create an application that uses a hybrid method cryptosystem and digital signature.... see more

Authentication and verification of digital data is important phase in internet based transaction and data access. For the authentication and verification used digital signature operation. For the operation of digital signature various cryptography techniq... see more

Penelitian ini bertujuan untuk menjaga keaslian data untuk memberikan jaminan kepada si penerima bahwa data tersebut bebas dari modifikasi yang dilakukan oleh pihak lain, dan jika terjadi suatu modifikasi terhadap data tersebut, maka si penerima akan meng... see more

1 of 3.859 pages  |  10  records  |  more records»