Design and Implementation of Database Security for Various type of Digital Signature

2018 ◽  
Vol 9 (1) ◽  
pp. 99
Author(s):  
Sarvesh Tanwar ◽  
Anil Kumar
2013 ◽  
Vol 427-429 ◽  
pp. 806-809 ◽  
Author(s):  
Lei Wang ◽  
Yan Yan Yu ◽  
Qian Huang ◽  
Jun Yang ◽  
Zheng Peng Zhao

This paper introduces the principle of digital signature algorithm MD5, focused on the calculation phase of the algorithm, the algorithm structure iteration of the loop, and to optimize its calculation phase, and given FPGA design icon, the experiment can be drawn based on FPGA with less resource, fast implementation of the MD5 algorithm. The hardware implementation of the MD5 hash algorithm HMACs build encryption accelerator which has some practical value.


2021 ◽  
pp. 658-675
Author(s):  
Mohammed Issam Younis ◽  
Athraa H. Alwan

The spread of Coronavirus has forced populations around the globe to adopt strict measures such as lockdown, home quarantine, and home office. Moreover, in the current development of network communications, people can exploit internet and intranet features in many systems that need to be faster, more efficient, and available on time. Furthermore, with the benefits of using internet-of-things (IoT), through which things are generated, gained, discovered, and proposed without interference, the user could receive the last status without exertion and direct contact (i.e., in a contactless manner). These specifications can be used in a transaction system. This paper proposes an electronic transaction system (ETS) as a replacement for the current paper transaction used in most organizations’ environments. The progress includes the signing privilege, access right for each position, delivery reports, transaction tracking, and transaction storage safety. Transactions will be stored in an encrypted way at the database to keep them safe from illegal changes. For that, a secure electronic transaction is created with digital signature services. The negligence can be identified in the workflow by tracking the operations and receiving exceptional cases’ alerts. Finally, this paper compared the proposed system against state-of-the-art systems.


2013 ◽  
Vol 2 (3) ◽  
pp. 147-153
Author(s):  
Ayman Mohamed Mostafa ◽  
Mohamed Hashem Abdel-Aziz ◽  
Ibrahim Mahmoud El-Henawy

2021 ◽  
Vol 21 (2) ◽  
pp. 29-35
Author(s):  
Ju Hyeon Kim ◽  
◽  
Young Jin Joo ◽  
Ara Hur ◽  
Min Kyoung Cho ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document