A Review of Digital Signature Using Different Elliptic Cryptography Technique
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2016, Vol 15, Issue 8
Abstract
Authentication and verification of digital data is important phase in internet based transaction and data access. For the authentication and verification used digital signature operation. For the operation of digital signature various cryptography techniques is used. The strength of cryptography technique measures the strength of digital signature. For the strength improvement various cryptography techniques is used such as RSA, ECC and some other bit level cryptography technique. In this paper present the review of digital signature technique basically based on elliptic curve cryptography technique. The elliptic curve cryptography technique is much stronger than other cryptography technique.Â
Authors and Affiliations
Anurag Singh Bhadoria
Web Client and Web Server approaches to Prevent XSS Attacks
Websites rely completely on complex web applications to deliver content to all users according to set preferences and specific needs. In this manner organizations provide better value to their customers and prospects. Dy...
Load-Balancing using HA Proxy on Multipath System with Flow Slice
To provide switching capacity in terabit or petabit uses core routers in multipath switching systems (MPS). Without disturbing the order of intra flow packets, the load balance across multiple paths is the main issue of...
POWER SAVING LOAD BALANCING STRATEGY USING DVFS IN CLOUD ENVIRONMENT
Cloud Computing is a technology that provides a platform for the sharing of resources such as software, infrastructure, application and other information. Cloud Computing is being used widely all over the world by many I...
Comparative Analysis of Various Cloud Technologies
With the increasing prevalence and demand of large scale cloudcomputing environment, a researcher has to draw more attentiontowards the services provided by the CLOUD. As the access tothe server is increasing, centralize...
Fingerprint Database Variations for WiFi Positioning
Indoor positioning systems calculate the position of a mobile device (MD) in an enclosed environment with relative precision. Most systems use WiFi infrastructure and several positioning techniques, where the most common...