Reference Citations - HerongYang.com - v2.94, by Herong Yang
Application of the Enhanced SHA-1
'Digital Signature Scheme for Email Messages' tutorial was cited in a JOURNAL OF APPLIED SCIENCES RESEARCH paper in 2015.
The Digital Signature Scheme for Email Messages tutorial was cited in a JOURNAL OF APPLIED SCIENCES RESEARCH paper in 2015.
Subject: Application of the Enhanced SHA-1 for On-line Authentication and Security of Documents Date: 31 October 2015 Author: Christine Charmaine G. San Jose, Bobby D. Gerardo and Bartolome T. Tanguilig III Source: http://www.aensiweb.net/AENSIWEB/jasr/jasr /2015/Special%20IPN%20Oct/47-52.pdf ... A digital signature consists of a mathematical calculation that demonstrates the authenticity of a message. Dr. Herong Yang [14] discussed the use of hash algorithm in a digital scheme for e-mail messages. A digital signature scheme for e-mail messages consist of a sender that has a privatepublic pair, a sender generates a digital signature the private key and a message digest of the original email, a digital signature is attached to the email and delivered to the receiver, a receiver decrypts the digital signature using the sender's public key and compares with the message digest of the received email and lastly, the receiver knows that received email has been tampered with by a third party if the message digest does not match the decrypted digital signature. ... 13. Phys.Org, 2009. “Bell Labs breaks optical transmission record”, http://phys.org/news/2009-09-bell-labs-opticaltransmission- petabit.html 14. Yang, H., Digital Signature Scheme for E-mail Messages. PKI Tutorials. https://www.herongyang.com/PKI/SMIMEDigital-Signature -Scheme-for-EmailMessages.html 15. Schneier, B., 2005. Schneier Security. Article: Cryptanalysis of SHA-1, https://www.schneier.com/blog/archives/2005/02 /cryptanalysis_o.html ...
Table of Contents
SSL/TLS Overview - Change Cipher Spec Protocol
PFX to Java Keystore / Extract private key from Java Keystore
Android talks #08 decompiling android applications
Cpronto 2.5 Administration Guide
IMPLEMENTATION OF SECURE HASH ALGORITHM SHA-1 BY LABVIEW
Cryptographic Protocols - The Peruvian Coin Flip
Bug 378637 - Add support for connecting to HTTP proxy over HTTPS
an information literacy technology for chemistry documents
org.jruby.exceptions.RaiseException: stack level too deep
Another function that helps programmers calculate
CONNECTING TO A SOAP WEB SERVICE
►Application of the Enhanced SHA-1
Apex Soap call authentication problem
Recording Video of an Android Device
Java HTTPS server code failing
How to Capture Logcat Files Using ADB