On authentication, digital signatures and signature laws

被引:0
|
作者
Kaijser, P [1 ]
机构
[1] Siemens AG, D-81730 Munich, Germany
来源
SECURE INFORMATION NETWORKS: COMMUNICATIONS AND MULTIMEDIA SECURITY | 1999年 / 23卷
关键词
authentication; digital signature; electronic signature; signature law;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The public debate arising from the introduction of signature laws in North America, Europe and elsewhere has prompted this paper. This paper analyses and compares the closely interrelated concepts of authentication, digital signatures and electronic signature laws and tries to explain and resolve some of the ambiguities. Non-trivial problems and issues not much seen in the debate are discussed together with some suggestions as to how to overcome them. The aim of the paper is to help the promotion of both digital signatures and electronic signatures in order to improve the trust and confidence in, and acceptability of, documents in electronic form.
引用
收藏
页码:117 / 130
页数:14
相关论文
共 50 条
  • [31] Secure and Incidental Distortion Tolerant Digital Signature for Image Authentication
    Yong-Dong Zhang
    Sheng Tang
    Jin-Tao Li
    Journal of Computer Science and Technology, 2007, 22 : 618 - 625
  • [32] Secure and incidental distortion tolerant digital signature for image authentication
    Zhang, Yong-Dong
    Tang, Sheng
    Li, Jin-Tao
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (04) : 618 - 625
  • [33] A remote password authentication scheme based on the digital signature method
    Hwang, MS
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 1999, 70 (04) : 657 - 666
  • [34] Fault resilient and compression tolerant digital signature for image authentication
    Lou, DC
    Liu, JL
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (01) : 31 - 39
  • [35] Password authentication schemes based upon digital signature schemes
    Qi, Ming
    Zhang, Ling
    Tang, Shaohua
    Xiao, Guozhen
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 18 (11): : 43 - 49
  • [36] VO authentication framework in grid environment using digital signature
    Lee, Seoung-Hyeon
    Choi, Byung-Sun
    Lee, Jae-Seung
    Moon, Ki-Young
    Lee, Jae-Kwang
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 2, 2006, 3981 : 945 - 953
  • [37] Hyper Elliptic Curve System Digital Signature in Identity Authentication
    Wei, Li-feng
    Ji, Jian-wei
    2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ARTIFICIAL INTELLIGENCE (ICCSAI 2013), 2013, : 35 - 38
  • [38] Signature Authentication
    Nista, Elizabeth
    BIOLOGY OF BLOOD AND MARROW TRANSPLANTATION, 2013, 19 (02) : S170 - S170
  • [39] Column Level Image Authentication Technique using Hidden Digital Signatures
    Khan, Sahib
    Wahid, Muneeza
    Khan, Tawab
    Ahmad, Nasir
    Zafar, Muhammad Haseeb
    2018 24TH IEEE INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC' 18), 2018, : 107 - 112
  • [40] FPGA implementation of GF (Pm) exponentiation for digital signature and authentication scheme
    Han, F
    Chu, JP
    Lai, ZS
    Tao, T
    Li, CS
    Li, XB
    Wu, JJ
    Xia, HM
    2004: 7TH INTERNATIONAL CONFERENCE ON SOLID-STATE AND INTEGRATED CIRCUITS TECHNOLOGY, VOLS 1- 3, PROCEEDINGS, 2004, : 2039 - 2042