An Approach towards Digital Signatures for e-Governance in India
暂无分享,去创建一个
[1] S. Prasanna Ganesan,et al. An asymmetric authentication protocol for mobile devices using elliptic curve cryptography , 2010, 2010 2nd International Conference on Advanced Computer Control.
[2] Ayman I. Kayssi,et al. Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[3] Jörg Schwenk,et al. On Technical Security Issues in Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.
[4] S. Prasanna Ganesan. An Authentication Protocol For Mobile Devices Using Hyperelliptic Curve Cryptography , 2010 .
[5] Gene Tsudik,et al. Server-Supported Signatures , 1996, ESORICS.
[6] Johann Großschädl,et al. A Survey of Public-Key Cryptography on J2ME-Enabled Mobile Devices , 2004, ISCIS.
[7] Antonio F. Gómez-Skarmeta,et al. A Survey of Electronic Signature Solutions in Mobile Devices , 2007, J. Theor. Appl. Electron. Commer. Res..
[8] Wolfgang Bauer,et al. Minimal-footprint Middleware for the Creation of Qualified Signatures , 2010, WEBIST.
[9] Deren Chen,et al. Generating digital signatures on mobile devices , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..
[10] Antonio Maña,et al. Practical Mobile Digital Signatures , 2002, EC-Web.
[11] William M. Daley,et al. Security Requirements for Cryptographic Modules , 1999 .
[12] Frank Stajano,et al. On Storing Private Keys in the Cloud , 2010, Security Protocols Workshop.
[13] Kanika Lakhani,et al. Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing , 2010, 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010).
[14] Deepak Singh Chouhan,et al. Building Trust In Cloud Using Public Key Infrastructure - A step towards cloud trust , 2012 .
[15] Gustavus J. Simmons,et al. Symmetric and Asymmetric Encryption , 1979, CSUR.
[16] S. K. Dubey,et al. Security and Privacy in Cloud Computing: A Survey , 2013 .
[17] Heiko Rossnagel,et al. Mobile Qualified Electronic Signatures and Certification on Demand , 2004, EuroPKI.
[18] Sathya Narayanan,et al. Mobile Device Data Security: A Cryptographic Approach by Outsourcing Mobile Data to Cloud , 2015 .
[19] Matt Bishop,et al. What Is Computer Security? , 2003, IEEE Secur. Priv..
[20] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .