Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Electronic signature

Known as: Esignature, Electronic signatures, E-signature 
An electronic signature, or e-signature, refers to data in electronic form, which is logically associated with other data in electronic form and… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
Quantum cryptography is arguably the fastest growing area in quantum information science. Novel theoretical protocols are… Expand
Review
2017
Review
2017
Despite continuous technological enhancements of metal Additive Manufacturing (AM) systems, the lack of process repeatability and… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Highly Cited
2004
Highly Cited
2004
We introduce a short signature scheme based on the Computational Diffie-Hellman assumption on certain elliptic and hyperelliptic… Expand
  • table 1
  • table 2
Highly Cited
2001
Highly Cited
2001
Linear spectral mixture analysis (LSMA) is a widely used technique in remote sensing to estimate abundance fractions of materials… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2000
Highly Cited
2000
We present a new protocol that allows two players to exchange digital signatures over the Internet in a fair way, so that either… Expand
Highly Cited
1997
Highly Cited
1997
A sound pressure level meter adapted for use in monitoring noise levels, particularly for use by law enforcement agencies wherein… Expand
Highly Cited
1993
Highly Cited
1993
CRYPTOGRAPHIC PROTOCOLS. Protocol Building Blocks. Basic Protocols. Intermediate Protocols. Advanced Protocols. Esoteric… Expand
Highly Cited
1993
Highly Cited
1993
This paper describes an algorithm for verification of signatures written on a pen-input tablet. The algorithm is based on a novel… Expand
  • figure 1
  • table 1
  • figure 2
Highly Cited
1983
Highly Cited
1983
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the… Expand
Highly Cited
1978
Highly Cited
1978
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the… Expand
  • table I