Please use this identifier to cite or link to this item:
http://ir.futminna.edu.ng:8080/jspui/handle/123456789/1750
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Adebayo, Olawale Surajudeen | - |
dc.contributor.author | Waziri, Victor O. | - |
dc.contributor.author | Ojeniyi, Joseph O. | - |
dc.contributor.author | Bashir, Sulaimon A. | - |
dc.contributor.author | Mishra, Amit | - |
dc.date.accessioned | 2021-06-06T14:26:35Z | - |
dc.date.available | 2021-06-06T14:26:35Z | - |
dc.date.issued | 2012-11 | - |
dc.identifier.issn | 1947 – 5500 | - |
dc.identifier.uri | http://repository.futminna.edu.ng:8080/jspui/handle/123456789/1750 | - |
dc.description.abstract | This paper presents simple abstraction concepts for some digital signature scheme algorithms that include ElGamal Signature scheme, Schnorr Signature scheme, Elliptic Curve Signature (ECS), and Digital Signature Standard (DSA). It also examines the security of this digital signature scheme to measure its effectiveness and improve on the variability. The algorithms are essential in securing application in dispatching the documents on the communication network. We try to explain the algorithms in simple form and the examples are experimented in C++ programming language which presupposing little or easy mathematical background comprehension and easy computations | en_US |
dc.language.iso | en | en_US |
dc.publisher | International Journal of Computer Science and Information Security (IJCSIS) | en_US |
dc.relation.ispartofseries | Volume 10;11 | - |
dc.subject | ElGamal Signature scheme | en_US |
dc.subject | Signature Scheme | en_US |
dc.subject | Elliptic Curve Signature | en_US |
dc.subject | Digital Signature | en_US |
dc.subject | Information Security | en_US |
dc.title | information security on the communication network in Nigeria based on digital Signature | en_US |
dc.type | Article | en_US |
Appears in Collections: | Cyber Security Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Info Sec on Comm JournalOfComputerScienceIjcsisVol.10No.11November2012.pdf | 5.71 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.