نتایج جستجو برای: qualifications for secured electronic signature

تعداد نتایج: 10439479  

2009
Jorge L. Hernandez-Ardieta Ana Isabel González-Tablas Ferreres Benjamín Ramos Arturo Ribagorda

Electronic signatures have been legally recognized as the key element for boosting e-commerce under secure conditions. Several legislations throughout the world establish electronic signatures as legally equivalent to hand-written signatures, assigning them the property of evidence in legal proceedings. In addition, international standards define electronic signatures as non-repudiation evidenc...

2005
Lih-Chung Wang Yuh-Hua Hu Feipei Lai Chun-yen Chou Bo-Yin Yang

Digital signature schemes are crucial for applications in electronic commerce. The effectiveness and security of a digital signature scheme rely on its underlying public key cryptosystem. Trapdoor functions are central to public key cryptosystems. However, the modular exponentiation for RSA or the discrete logarithms for ElGamal/DSA/ECC, as the choice of the trapdoor functions, are relatively s...

Journal: :Advances in parallel computing 2022

To provide an efficient cloud environment for secured based users to improve user authentication and storage security prevent cyber attacks on Digital Signature Algorithm (DSA) over Novel Advanced Encryption Standard (AES). Sample dataset considered both algorithms were N=10 iterated by G power 80%, threshold 0.05%, CI 95% mean standard deviation. Split size of training test is 70% 30% respecti...

2003
Ahto Buldas Märt Saarepera

We propose a simple server-based electronic signature system in which a small number of common private keys are used. The motivation of such a system is to escape the scalability and complexity problems that arise if a large-scale Public Key Infrastructure (PKI) is used. We argue that the assumption of personal private keys is the main reason for those problems and high cost of electronic signa...

1995
P. ROBINSON PETER ROBINSON Marcus Rubin Peter Robinson

There is no parity of esteem between academic and vocational qualifications in the labour market. Data from the Labour Force Survey show that on average men and women working full-time with academic qualifications at one level in the national qualifications framework earn about the same as men and women with vocational qualifications set notionally one level higher. So those with A levels have ...

2000
Wenbo Mao

We present a method for blind certifying end-users' public keys and its application in offline electronic cash. A blind certificate of a public key is similar to an ordinary public-key certificate, however the identity of the certificate holder is concealed under the key certified. A digital signature supported by a blind certificate can be verified without identifying the signer. The technique...

Journal: :Physical review letters 2014
Robert J Collins Ross J Donaldson Vedran Dunjko Petros Wallden Patrick J Clarke Erika Andersson John Jeffers Gerald S Buller

Digital signatures are widely used to provide security for electronic communications, for example, in financial transactions and electronic mail. Currently used classical digital signature schemes, however, only offer security relying on unproven computational assumptions. In contrast, quantum digital signatures offer information-theoretic security based on laws of quantum mechanics. Here, secu...

2007
Toktam Taghavi Abbas Ghaemi Bafghi Mohsen Kahani

Many e-voting schemes have been proposed in the literature. However, none of them is both secure and practical. In this paper, a practical and secure electronic voting protocol for large-scale voting over the Internet is investigated. Blind signature is applied to a voter's ballot making it impossible for anyone to trace the ballot back to the voter. Unlike previous blind signature based scheme...

2010
Martin Centner Clemens Orthacker Wolfgang Bauer

Qualified electronic signatures are recognized as being equivalent to handwritten signatures and are supported by EU legislation. They require a secure signature creation device (SSCD) such as a smart card. Unfortunately, there are neither standard means for the integration of SSCDs with Web applications, nor are the exiting means widely deployed. Web application providers are still faced with ...

2003
Dang Nguyen Duc Jung Hee Cheon Kwangjo Kim

Key exposure problem turns out to be very serious in security services. For example, in electronic cash, the problem is very severe since money is directly involved. In other applications of cryptography, it is also a devastating attack. Forward security is the first security notion addressing the this issue. Roughly speaking, forward secrecy is aimed to protect validity of the all usage before...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید