Showing 1 - 20 results of 7,892 for search '"verification"', query time: 0.09s Refine Results
  1. 1

    E-invoice authenticity verification scheme based on signature verification by Rongna XIE, Weihua MAO, Guozhen SHI

    Published 2019-12-01
    “…With the rapid development of network and information technology,paperless and electronic have become the development trend of today's economic life.As a consumption certificate,electronic invoices have become more and more demanding in e-commerce.The existing electronic invoice verification method is to inquire the invoice information in the national electronic account base according to the invoice number,invoice code,billing date,and amount,and realize the function of comparison inquiry,and can not detect the fraudulent behavior of issuing invoices by non-issuing institutions,and cannot guarantee the full legality and authenticity of electronic invoices.Aiming at the above problems,a verification scheme for electronic invoice authenticity based on signature authentication was proposed.By verifying the signature of the tax agency,the legality verification of the blank electronic invoice is verified,and the digital signature of the seller is verified to determine the authenticity of the invoiced content.Ensure that the electronic invoices passed for verification are true and reliable.…”
    Get full text
    Article
  2. 2

    Automatic construction and verification algorithm for smart contracts based on formal verification by Rui Xie, Xuejiao Zhong, Xin Chen, Shaohui Xu, Haiyang Yu, Xinyuan Guo

    Published 2024-11-01
    “…Consequently, the research on automatic construction and verification algorithms for smart contracts based on formal verification proves to be effective and feasible in practical applications.…”
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Formal Modeling and Verification for MVB by Mo Xia, Kueiming Lo, Shuangjia Shao, Mian Sun

    Published 2013-01-01
    “…The MVB system modeling and verification are concerned in this paper. Petri Net and model checking methods are used to verify the MVB system. …”
    Get full text
    Article
  6. 6

    Objectification and verification of financial information by A. V. Petukh, V. V. Bashkatov, O. I. Shvyreva

    Published 2023-12-01
    “…The purpose of the study is to identify the concept of “financial information” for its relevant use in rulemaking and science, as well as to determine the verification features of this type of information generated by economic entities in order to ensure reasonable user confidence in its quality. …”
    Get full text
    Article
  7. 7

    LTL Verification of Automaton Programs by K. A. Vasileva, E. V. Kuzmin

    Published 2007-03-01
    “…In the paper one of approaches to modelling, specification and verification of automaton programs are considered. The automata programming technology is effective enough in design and verification (the analysis of correctness) software for reactive and controlling systems. …”
    Get full text
    Article
  8. 8
  9. 9

    Verification of Synchronous-automaton Programs by S. V. Kubasov

    Published 2007-12-01
    “…This article presents a synchronous model of the automaton program. A technique of verification of synchronous-automaton programs has been developed. …”
    Get full text
    Article
  10. 10
  11. 11
  12. 12
  13. 13

    Verification of Opacity and Diagnosability for Pushdown Systems by Koichi Kobayashi, Kunihiko Hiraishi

    Published 2013-01-01
    “…In this paper, we discuss verification of opacity and diagnosability for infinite-state DESs modeled by pushdown automata (called here pushdown systems). …”
    Get full text
    Article
  14. 14

    Orthogonality broadcasting and quantum position verification by Ian George, Rene Allerstorfer, Philip Verduyn Lunel, Eric Chitambar

    Published 2025-01-01
    “…We then relate orthogonality broadcasting to quantum position verification and provide a new method for establishing error bounds in the no pre-shared entanglement model that can address protocols previous methods could not. …”
    Get full text
    Article
  15. 15
  16. 16
  17. 17
  18. 18

    On cofactored verification of EdDSA signatures by Adrian Cinal, Oliwer Sobolewski

    Published 2025-06-01
    “…This is done by sanctioning two variants of the signature verification equation and specifying precedence of one over the other. …”
    Get full text
    Article
  19. 19
  20. 20

    Service for Verification of Electronic Document’s Certificates by I. O. Tolokh, S. Yu. Mikhnevich, A. Yu. Siankevich

    Published 2023-12-01
    “…The technical normative legal acts in the field of cryptographic protection of electronic documents are analyzed. The necessity of verification of certificates of public keys of electronic digital signature is substantiated. …”
    Get full text
    Article