Works matching DE "DIGITAL signatures"
1
- Quasigroups & Related Systems, 2025, v. 33, n. 1, p. 71, doi. 10.56415/qrs.v33.06
- Moldovyan, Alexandr A.;
- Moldovyan, Nikolay A.
- Article
2
- International Journal of Next-Generation Computing, 2025, v. 16, n. 1, p. 47
- Patra, Apurba;
- Basu, Saikat;
- Majumder, Koushik
- Article
3
- International Journal of Communication (19328036), 2024, v. 18, p. 784
- MORADI, PEGAH;
- LEVY, KAREN
- Article
4
- Collected Papers of the Law Faculty of the University of Rijeka / Zbornik Pravnog Fakulteta Sveučilišta u Rijeci, 2025, v. 46, n. 1, p. 163, doi. 10.30925/zpfsr.46.1.8
- Article
5
- EAI Endorsed Transactions on Scalable Information Systems, 2025, v. 12, n. 2, p. 1, doi. 10.4108/eetsis.9014
- Sharifpour, Mohammadjavad;
- Shajari, Mehdi;
- Asghari Tochae, Seyyed Amir
- Article
6
- Multimedia Tools & Applications, 2025, v. 84, n. 13, p. 12123, doi. 10.1007/s11042-024-19444-w
- Shankar, Gauri;
- Singh, Parvinder;
- Dewangan, Narendra Kumar;
- Chandrakar, Preeti
- Article
7
- Indian Journal of Pharmacology, 2015, v. 47, n. 4, p. 349, doi. 10.4103/0253-7613.161247
- Article
8
- Records Management Quarterly (1986), 1994, v. 28, n. 2, p. 18
- Theofanos, Mary F.;
- Phillips, John T.
- Article
9
- Journal of Computer-Mediated Communication, 2006, v. 11, n. 4, p. 1046, doi. 10.1111/j.1083-6101.2006.00307.x
- Rains, Stephen A.;
- Young, Anna M.
- Article
10
- Revista de Derecho (15105172), 2024, v. 23, n. 46, p. 169, doi. 10.47274/DERUM/46.10
- Article
11
- Chemistry - A European Journal, 2024, v. 30, n. 69, p. 1, doi. 10.1002/chem.202402492
- Sena Tömekce, Birce;
- Cuxart, Marc G.;
- Caputo, Laura;
- Poletto, Daniele;
- Charlier, Jean‐Christophe;
- Bonifazi, Davide;
- Auwärter, Willi
- Article
12
- Journal of Materials Science: Materials in Electronics, 2020, v. 31, n. 17, p. 14443, doi. 10.1007/s10854-020-04004-3
- da Silva, M. F. P.;
- Souza, E. J. P.;
- Junior, A. T. S.;
- Cavallari, M. R.;
- Paterno, L. G.;
- Campos, A. F. C.;
- Fonseca, F. J.;
- Bernardi, J. V. E.;
- Landers, R.
- Article
13
- International Journal of Image & Graphics, 2006, v. 6, n. 3, p. 407, doi. 10.1142/S0219467806002318
- Bin Li;
- Zhang, David;
- Kuanquan Wang
- Article
14
- International Journal of Image & Graphics, 2005, v. 5, n. 1, p. 67, doi. 10.1142/S0219467805001665
- Lu, Haiping;
- Shi, Yun Q.;
- Kot, Alex C.;
- Chen, Lihui
- Article
15
- International Journal of Image & Graphics, 2005, v. 5, n. 1, p. 89, doi. 10.1142/S0219467805001677
- Echizen, Isao;
- Fujii, Yasuhiro;
- Yamada, Takaaki;
- Tezuka, Satoru;
- Yoshiura, Hiroshi
- Article
16
- International Journal of Image & Graphics, 2005, v. 5, n. 1, p. 135, doi. 10.1142/S0219467805001690
- Sun, Qibin;
- Ye, Shuiming;
- Lin, Ching-Yung;
- Chang, Shih-Fu
- Article
17
- International Journal of Networked & Distributed Computing, 2024, v. 12, n. 2, p. 237, doi. 10.1007/s44227-024-00029-w
- Gopalan, S. Harihara;
- Manikandan, A.;
- Dharani, N. P.;
- Sujatha, G.
- Article
18
- International Journal of Cognitive Computing in Engineering, 2024, v. 5, p. 78, doi. 10.1016/j.ijcce.2024.01.003
- Ch, Rupa;
- K., Naga Vivek;
- Srivastava, Gautam;
- Gadekallu, Reddy
- Article
19
- International Journal of Cognitive Computing in Engineering, 2024, v. 5, p. 379, doi. 10.1016/j.ijcce.2024.08.002
- Hameed, Mohamed Abdel;
- Hassaballah, M.;
- Abdelazim, Riem;
- Sahu, Aditya Kumar
- Article
20
- Cihan University-Erbil Journal of Humanities & Social Sciences, 2024, v. 8, n. 2, p. 102, doi. 10.24086/cuejhss.v8n2y2024.pp102-109
- Article
21
- Cihan University-Erbil Journal of Humanities & Social Sciences, 2024, v. 8, n. 2, p. 54, doi. 10.24086/cuejhss.v8n2y2024.pp54-64
- Article
22
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 1, p. 1, doi. 10.1049/ise2.12040
- Yuan, Quan;
- Tibouchi, Mehdi;
- Abe, Masayuki
- Article
23
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 3, p. 266, doi. 10.1049/iet-ifs.2019.0141
- Krenn, Stephan;
- Pöhls, Henrich C.;
- Samelin, Kai;
- Slamanig, Daniel
- Article
24
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 1, p. 99, doi. 10.1049/iet-ifs.2019.0249
- Li, Xuelian;
- Han, Yue;
- Gao, Juntao;
- Niu, Jie
- Article
25
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 1, p. 30, doi. 10.1049/iet-ifs.2018.5491
- Zhang, Huang;
- Zhang, Fangguo;
- Wei, Baodian;
- Du, Yusong
- Article
26
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 6, p. 670, doi. 10.1049/iet-ifs.2019.0156
- Papachristoudis, Dimitrios;
- Hristu‐Varsakelis, Dimitrios;
- Baldimtsi, Foteini;
- Stephanides, George
- Article
27
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 6, p. 579, doi. 10.1049/iet-ifs.2018.5460
- Article
28
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 5, p. 459, doi. 10.1049/iet-ifs.2018.5063
- Rastegari, Parvin;
- Dakhilalian, Mohammad;
- Berenjkoub, Mehdi;
- Susilo, Willy
- Article
29
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 3, p. 167, doi. 10.1049/iet-ifs.2018.5226
- Shen, Limin;
- Ma, Jianfeng;
- Miao, Yinbin;
- Liu, Hai
- Article
30
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 6, p. 475, doi. 10.1049/iet-ifs.2017.0567
- Hu, Mingxing;
- Ye, Qing;
- Tang, Yongli
- Article
31
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 3, p. 184, doi. 10.1049/iet-ifs.2017.0029
- Sakai, Yusuke;
- Attrapadung, Nuttapong;
- Hanaoka, Goichiro
- Article
32
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 3, p. 194, doi. 10.1049/iet-ifs.2017.0082
- Meiser, Sebastian;
- Schröder, Dominique
- Article
33
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 3, p. 165, doi. 10.1049/iet-ifs.2018.0043
- Article
34
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 2, p. 150, doi. 10.1049/iet-ifs.2017.0342
- Verma, Girraj Kumar;
- Singh, B.B.
- Article
35
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 1, p. 34, doi. 10.1049/iet-ifs.2017.0023
- Rajabzadeh Asaar, Maryam;
- Ameri, Mohammad Hassan;
- Salmasizadeh, Mahmoud;
- Aref, Mohammad Reza
- Article
36
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 3, p. 168, doi. 10.1049/iet-ifs.2015.0285
- Pang, Liaojun;
- Hu, Yufei;
- Zhou, Xia;
- Wang, Yumin;
- Li, Huixian
- Article
37
- IET Information Security (Wiley-Blackwell), 2016, v. 10, n. 6, p. 358, doi. 10.1049/iet-ifs.2015.0429
- Barthe, Gilles;
- Fagerholm, Edvard;
- Fiore, Dario;
- Scedrov, Andre;
- Schmidt, Benedikt;
- Tibouchi, Mehdi
- Article
38
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 5, p. 273, doi. 10.1049/iet-ifs.2013.0062
- Guan, Chaowen;
- Weng, Jian;
- Deng, Robert H.;
- Chen, Minrong;
- Zhou, Dehua
- Article
39
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 4, p. 343, doi. 10.1049/iet-ifs.2012.0350
- Jiao, Dong;
- Li, Mingchu;
- Ou, Jinping;
- Guo, Cheng;
- Ren, Yizhi;
- Cui, Yongrui
- Article
40
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 4, p. 327, doi. 10.1049/iet-ifs.2012.0340
- Cronin, Brendan;
- Wang, Xiaojun
- Article
41
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 4, p. 300, doi. 10.1049/iet-ifs.2010.0059
- Piper, Angela;
- Safavi‐Naini, Reihaneh
- Article
42
- IET Image Processing (Wiley-Blackwell), 2023, v. 17, n. 8, p. 2516, doi. 10.1049/ipr2.12814
- Liu, Dawei;
- Liu, Donglin;
- Wang, Bin;
- Zheng, Pan
- Article
43
- Turkiye Klinikleri Journal of Health Sciences / Türkiye Klinikleri Sağlık Bilimleri Dergisi, 2023, v. 8, n. 4, p. 686, doi. 10.5336/healthsci.2023-98574
- Article
44
- Leonardo, 2021, v. 54, n. 3, p. 311, doi. 10.1162/leon_a_02032
- Article
45
- Fordham Journal of Corporate & Financial Law, 2019, v. 24, n. 2, p. 363
- Article
46
- ISSA Journal, 2023, v. 21, n. 3, p. 5
- Article
47
- ISSA Journal, 2022, v. 20, n. 12, p. 5
- Article
48
- ISSA Journal, 2022, v. 20, n. 5, p. 6
- Article
49
- ISSA Journal, 2020, v. 18, n. 11, p. 11
- Article
50
- ISSA Journal, 2019, v. 17, n. 6, p. 26
- Article