Several authors have recently proposed digital signature schemes [1], [2],.. In an environment where identification is not possible, and the transmission safe the use of these schemes certify that the data originated from the legitimate person. However in an environment where identification can be ensured by other means and where transmission is done in an unsafe medium, the use of the same schemes ensure data inteqrity: any modification of the data during transmission shows up when one checks the corresponding signature.
CITATION STYLE
Harari, S. (1985). Non linear non commutative functions for data integrity. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 209 LNCS, pp. 25–32). Springer Verlag. https://doi.org/10.1007/3-540-39757-4_4
Mendeley helps you to discover research relevant for your work.