{"id":"https://openalex.org/W4413017952","doi":"https://doi.org/10.1109/iccad64771.2025.11099180","title":"Cybersecurity - Enhancing Digital Transaction Authentication through Improved Digital Signature Process","display_name":"Cybersecurity - Enhancing Digital Transaction Authentication through Improved Digital Signature Process","publication_year":2025,"publication_date":"2025-07-01","ids":{"openalex":"https://openalex.org/W4413017952","doi":"https://doi.org/10.1109/iccad64771.2025.11099180"},"language":"en","primary_location":{"id":"doi:10.1109/iccad64771.2025.11099180","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccad64771.2025.11099180","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Conference on Control, Automation and Diagnosis (ICCAD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111430116","display_name":"Loubna Ali","orcid":null},"institutions":[{"id":"https://openalex.org/I4210125870","display_name":"Institute for Social Innovation","ror":"https://ror.org/03dfgbb18","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210125870"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Loubna Ali","raw_affiliation_strings":["Berlin School of Business and Innovation GmbH,Berlin,Germany"],"affiliations":[{"raw_affiliation_string":"Berlin School of Business and Innovation GmbH,Berlin,Germany","institution_ids":["https://openalex.org/I4210125870"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070290912","display_name":"Chakib Ben Njima","orcid":null},"institutions":[{"id":"https://openalex.org/I8636806","display_name":"University of Sousse","ror":"https://ror.org/00dmpgj58","country_code":"TN","type":"education","lineage":["https://openalex.org/I8636806"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Chakib Ben Njima","raw_affiliation_strings":["University of Monastir / ISTLS, University of Sousse,LARATSI-ENIM,Tunisia"],"affiliations":[{"raw_affiliation_string":"University of Monastir / ISTLS, University of Sousse,LARATSI-ENIM,Tunisia","institution_ids":["https://openalex.org/I8636806"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090257805","display_name":"Balaganesh Duraisamy","orcid":"https://orcid.org/0000-0003-3771-3795"},"institutions":[{"id":"https://openalex.org/I4210125870","display_name":"Institute for Social Innovation","ror":"https://ror.org/03dfgbb18","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210125870"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Duraisamy Balaganesh","raw_affiliation_strings":["Berlin School of Business and Innovation GmbH,Berlin,Germany"],"affiliations":[{"raw_affiliation_string":"Berlin School of Business and Innovation GmbH,Berlin,Germany","institution_ids":["https://openalex.org/I4210125870"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5098751792","display_name":"Waseem Alhasan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210125870","display_name":"Institute for Social Innovation","ror":"https://ror.org/03dfgbb18","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210125870"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Waseem Alhasan","raw_affiliation_strings":["Berlin School of Business and Innovation GmbH,Berlin,Germany"],"affiliations":[{"raw_affiliation_string":"Berlin School of Business and Innovation GmbH,Berlin,Germany","institution_ids":["https://openalex.org/I4210125870"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015791655","display_name":"Ali Hasan Ali","orcid":"https://orcid.org/0000-0003-2959-4212"},"institutions":[{"id":"https://openalex.org/I875646752","display_name":"Damascus University","ror":"https://ror.org/03m098d13","country_code":"SY","type":"education","lineage":["https://openalex.org/I875646752"]}],"countries":["SY"],"is_corresponding":false,"raw_author_name":"Ali Ali","raw_affiliation_strings":["Arab Union for Internet and Communications,Damascus,Syria"],"affiliations":[{"raw_affiliation_string":"Arab Union for Internet and Communications,Damascus,Syria","institution_ids":["https://openalex.org/I875646752"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5111430116"],"corresponding_institution_ids":["https://openalex.org/I4210125870"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.3353576,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.5371000170707703,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.5371000170707703,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.47929999232292175,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14347","display_name":"Big Data and Digital Economy","score":0.45719999074935913,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.7691097259521484},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7512167692184448},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.7291362881660461},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6600737571716309},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5458850860595703},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.5280278921127319},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.5183440446853638},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.431618332862854},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.28714215755462646},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.1318543553352356},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.10419747233390808},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09329023957252502}],"concepts":[{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.7691097259521484},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7512167692184448},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.7291362881660461},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6600737571716309},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5458850860595703},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.5280278921127319},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.5183440446853638},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.431618332862854},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.28714215755462646},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.1318543553352356},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.10419747233390808},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09329023957252502},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccad64771.2025.11099180","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccad64771.2025.11099180","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Conference on Control, Automation and Diagnosis (ICCAD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1590983790","https://openalex.org/W1592431873","https://openalex.org/W2790150847","https://openalex.org/W2810422980","https://openalex.org/W3022572188","https://openalex.org/W4393005876","https://openalex.org/W6862702396"],"related_works":["https://openalex.org/W2149234266","https://openalex.org/W2390942931","https://openalex.org/W1932157736","https://openalex.org/W2104321465","https://openalex.org/W4250384982","https://openalex.org/W2892743407","https://openalex.org/W1601957798","https://openalex.org/W2125461068","https://openalex.org/W773319083","https://openalex.org/W191975850"],"abstract_inverted_index":{"Digital":[0],"signatures":[1,163,259],"are":[2,172],"crucial":[3],"for":[4,268],"ensuring":[5],"the":[6,28,34,41,49,68,90,98,130,135,142,151,158,161,166,193,204,208,213,226,238],"authenticity,":[7],"integrity,":[8],"and":[9,37,61,70,85,96,177,186,210,225,234,246],"non-repudiation":[10],"of":[11,57,72,92,112,119,141,153,160,212,243],"digital":[12,29,73,162,214,258,273],"messages,":[13],"especially":[14],"in":[15,48,89,134,183,241,272],"business":[16],"applications":[17],"where":[18],"data":[19,270],"security":[20,69,159,185,209,271],"is":[21,77,101,115,144,218],"paramount.":[22],"This":[23],"paper":[24],"explores":[25],"improvements":[26,182],"to":[27,66,106,125,128,195,222],"signature":[30],"process,":[31],"focusing":[32],"on":[33],"RSA":[35,50,176,262],"algorithm":[36],"its":[38],"integration":[39],"with":[40,174],"SHA-256":[42],"hashing":[43],"algorithm.":[44],"By":[45],"employing":[46],"variations":[47],"algorithm,":[51],"such":[52],"as":[53],"using":[54,117,230,260],"different":[55],"numbers":[56,233],"prime":[58,93,154,232],"factors":[59,94,155],"(two":[60],"four":[62,80,231],"primes),":[63],"we":[64],"aim":[65],"enhance":[67],"efficiency":[71],"signatures.":[74,215],"The":[75,110,169],"research":[76],"divided":[78],"into":[79,256],"scenarios:":[81],"H2PN,":[82],"H4PN,":[83],"A2PN,":[84],"A4PN,":[86],"each":[87],"differing":[88],"number":[91,152],"used":[95],"whether":[97],"hash":[99,194],"value":[100],"signed":[102],"directly":[103],"or":[104],"converted":[105],"ASCII":[107],"before":[108,200],"signing.":[109],"effectiveness":[111],"these":[113],"scenarios":[114],"evaluated":[116],"texts":[118],"varying":[120],"lengths,":[121],"from":[122],"short":[123],"phrases":[124],"longer":[126],"passages,":[127],"measure":[129],"avalanche":[131,167,205,244],"effect\u2014the":[132],"change":[133],"output":[136],"when":[137],"a":[138,265],"single":[139],"bit":[140],"input":[143],"altered.":[145],"Experimental":[146],"results":[147,227],"demonstrate":[148,228],"that":[149,191,229],"increasing":[150,165],"generally":[156],"enhances":[157],"by":[164],"effect.":[168],"proposed":[170],"methods":[171],"compared":[173],"traditional":[175],"other":[178],"cryptographic":[179],"algorithms,":[180],"highlighting":[181],"both":[184],"performance.":[187],"Our":[188],"findings":[189],"suggest":[190],"converting":[192],"an":[196],"alphanumerical":[197,235],"format":[198],"(ASCII)":[199],"encryption":[201],"significantly":[202],"improves":[203],"effect,":[206],"enhancing":[207],"robustness":[211],"Each":[216],"scenario":[217],"tested":[219],"multiple":[220],"times":[221],"ensure":[223],"accuracy,":[224],"conversion":[236],"yields":[237],"best":[239],"performance":[240],"terms":[242],"effect":[245],"overall":[247],"security.":[248],"In":[249],"conclusion,":[250],"this":[251],"study":[252],"provides":[253],"valuable":[254],"insights":[255],"optimizing":[257],"advanced":[261],"configurations,":[263],"offering":[264],"practical":[266],"solution":[267],"enhanced":[269],"communications.":[274]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
