Please use this identifier to cite or link to this item: http://ir.futminna.edu.ng:8080/jspui/handle/123456789/1750
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAdebayo, Olawale Surajudeen-
dc.contributor.authorWaziri, Victor O.-
dc.contributor.authorOjeniyi, Joseph O.-
dc.contributor.authorBashir, Sulaimon A.-
dc.contributor.authorMishra, Amit-
dc.date.accessioned2021-06-06T14:26:35Z-
dc.date.available2021-06-06T14:26:35Z-
dc.date.issued2012-11-
dc.identifier.issn1947 – 5500-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/1750-
dc.description.abstractThis paper presents simple abstraction concepts for some digital signature scheme algorithms that include ElGamal Signature scheme, Schnorr Signature scheme, Elliptic Curve Signature (ECS), and Digital Signature Standard (DSA). It also examines the security of this digital signature scheme to measure its effectiveness and improve on the variability. The algorithms are essential in securing application in dispatching the documents on the communication network. We try to explain the algorithms in simple form and the examples are experimented in C++ programming language which presupposing little or easy mathematical background comprehension and easy computationsen_US
dc.language.isoenen_US
dc.publisherInternational Journal of Computer Science and Information Security (IJCSIS)en_US
dc.relation.ispartofseriesVolume 10;11-
dc.subjectElGamal Signature schemeen_US
dc.subjectSignature Schemeen_US
dc.subjectElliptic Curve Signatureen_US
dc.subjectDigital Signatureen_US
dc.subjectInformation Securityen_US
dc.titleinformation security on the communication network in Nigeria based on digital Signatureen_US
dc.typeArticleen_US
Appears in Collections:Cyber Security Science

Files in This Item:
File Description SizeFormat 
Info Sec on Comm JournalOfComputerScienceIjcsisVol.10No.11November2012.pdf5.71 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.