نتایج جستجو برای: qualifications for secured electronic signature
تعداد نتایج: 10439479 فیلتر نتایج به سال:
A methodology for designing content based digital signatures which can be used to authenticate images is presented. A continuous measure of authenticity is presented which forms the basis of this methodology. Using this methodology signature systems can be designed which allow certain types of image modification (e.g. lossy compression) but which prevent other types of manipulation. Some experi...
Avukat Özgür Eralp provides an up-date to the electronic signature laws of Turkey, setting out full history legislation and recent legislative developments. 
 Index words: Turkey; signatures; legislation; update
This paper proposes a new secure e-voting protocol. This new scheme does not require a special voting channel and communication can occur entirely over the existing Internet. This method integrates Internet convenience and cryptology. In the existing protocols either the tallier has to wait for the decryption key from voter till the voting process is over or the verification process has to wait...
− Data certification and digital signature are a new area of interest and many standards have emerged. Indeed, these technologies offer identification, authentication and nonrepudiation capabilities during Internet transactions (emails and e-commerce). However, it appears that both certification and digital signature do not completely answer enterprise data authentication and secured data stora...
The Electronic Signature Law of the People’s Republic of China has been implemented for over seven years. However, a wide variety of legal problems exists. This paper analyzes four cases about e-signature use in China that covers four different areas: E-mail, short text message, E-banking, and online shopping. Various solutions to problems concerning e-signature use are also discussed. DOI: 10....
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید