On authentication, digital signatures and signature laws

被引:0
|
作者
Kaijser, P [1 ]
机构
[1] Siemens AG, D-81730 Munich, Germany
来源
SECURE INFORMATION NETWORKS: COMMUNICATIONS AND MULTIMEDIA SECURITY | 1999年 / 23卷
关键词
authentication; digital signature; electronic signature; signature law;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The public debate arising from the introduction of signature laws in North America, Europe and elsewhere has prompted this paper. This paper analyses and compares the closely interrelated concepts of authentication, digital signatures and electronic signature laws and tries to explain and resolve some of the ambiguities. Non-trivial problems and issues not much seen in the debate are discussed together with some suggestions as to how to overcome them. The aim of the paper is to help the promotion of both digital signatures and electronic signatures in order to improve the trust and confidence in, and acceptability of, documents in electronic form.
引用
收藏
页码:117 / 130
页数:14
相关论文
共 50 条
  • [21] Authentication and digital signature USB device for telemedicine applications
    Espitia, Alfredo
    Ortega, Karen
    Romero, Eduardo
    Jaramillo, Ivan
    2008 7TH INTERNATIONAL CARIBBEAN CONFERENCE ON DEVICES, CIRCUITS AND SYSTEMS, 2008, : 62 - +
  • [22] New image authentication scheme based on digital signature
    Liu, BF
    Zhang, WJ
    Yu, SY
    PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION SCIENCE AND TECHNOLOGY, VOL 2, 2004, : 302 - 307
  • [23] Sequential Digital Signatures for Cryptographic Software-Update Authentication
    Poettering, Bertram
    Rastikian, Simon
    COMPUTER SECURITY - ESORICS 2022, PT II, 2022, 13555 : 255 - 274
  • [24] Utilization of multiple block cipher hashing in authentication and digital signatures
    Rahouma, KH
    IEEE INTERNATIONAL CONFERENCE ON NETWORKS 2000 (ICON 2000), PROCEEDINGS: NETWORKING TRENDS AND CHALLENGES IN THE NEW MILLENNIUM, 2000, : 257 - 261
  • [25] Comparison of fingerprint and iris biometric authentication for control of digital signatures
    Zuckerman, AE
    Moon, KA
    Eaddy, K
    AMIA 2002 SYMPOSIUM, PROCEEDINGS: BIOMEDICAL INFORMATICS: ONE DISCIPLINE, 2002, : 1208 - 1208
  • [26] Improved Harn Batch Digital Signature Algorithm for Multicast Authentication
    Vijayakumar, P.
    Bose, S.
    Kannan, A.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2014, 17 (5-6): : 435 - 442
  • [27] A digital signature mechanism and authentication scheme for group communication in grid
    Li, Yunfa
    Jin, Hai
    Zou, Deqing
    Chen, Jieyun
    Han, Zongfen
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 42 - +
  • [28] Secure and Incidental Distortion Tolerant Digital Signature for Image Authentication
    张勇东
    唐胜
    李锦涛
    Journal of Computer Science & Technology, 2007, (04) : 618 - 625
  • [29] Video Authentication Using Watermark and Digital Signature-A Study
    Sowmya, K. N.
    Chennamma, H. R.
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS, ICCII 2016, 2017, 507 : 53 - 64
  • [30] An improved digital signature algorithm and authentication protocols in cloud platform
    Wang, Longge
    Song, Tao
    2016 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD), 2016, : 319 - 324