On authentication, digital signatures and signature laws

被引:0
|
作者
Kaijser, P [1 ]
机构
[1] Siemens AG, D-81730 Munich, Germany
来源
SECURE INFORMATION NETWORKS: COMMUNICATIONS AND MULTIMEDIA SECURITY | 1999年 / 23卷
关键词
authentication; digital signature; electronic signature; signature law;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The public debate arising from the introduction of signature laws in North America, Europe and elsewhere has prompted this paper. This paper analyses and compares the closely interrelated concepts of authentication, digital signatures and electronic signature laws and tries to explain and resolve some of the ambiguities. Non-trivial problems and issues not much seen in the debate are discussed together with some suggestions as to how to overcome them. The aim of the paper is to help the promotion of both digital signatures and electronic signatures in order to improve the trust and confidence in, and acceptability of, documents in electronic form.
引用
收藏
页码:117 / 130
页数:14
相关论文
共 50 条
  • [41] Image authentication based on digital signature and semi-fragile watermarking
    Hong-Bin Zhang
    Cheng Yang
    Xiao-Mei Quan
    Journal of Computer Science and Technology, 2004, 19 : 752 - 759
  • [42] Research on Security User Authentication Based on Digital Signature in Electronic Commerce
    Jiang, KeWei
    Fu, Ke
    Gao, ZhiBiao
    EIGHTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2009, : 812 - 817
  • [43] A smart card-based authentication system for undeniable digital signature
    Lee, JK
    Ryu, SR
    Kim, HC
    Yoo, KY
    COMPUTER APPLICATIONS IN INDUSTRY AND ENGINEERING, 2001, : 62 - 65
  • [44] Structural digital signature for image authentication: An incidental distortion resistant scheme
    Lu, CS
    Liao, HYM
    IEEE TRANSACTIONS ON MULTIMEDIA, 2003, 5 (02) : 161 - 173
  • [45] Image Feature Based Authentication and Digital Signature for Wireless Data Transmission
    Ziaullah, Mohammad
    Shetty, Prakash
    Kamal, Shoaib
    2016 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2016,
  • [46] A source authentication scheme based on message recovery digital signature for multicast
    Yang, Jen-Ho
    Lin, Iuon-Chang
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (11) : 2616 - 2627
  • [47] Image authentication based on digital signature and semi-fragile watermarking
    Zhang, HB
    Yang, C
    Quan, XM
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2004, 19 (06) : 752 - 759
  • [48] Using the Digital Signature of a Fingerprint by an Elliptic Curve Cryptosystem for Enhanced Authentication
    Shankar, T. N.
    Sahoo, G.
    Niranjan, S.
    INFORMATION SECURITY JOURNAL, 2012, 21 (05): : 243 - 255
  • [49] Digital Signature Technology Research of Distance Education Network Security Authentication
    Wei Wenshan
    Meng Xianxiao
    Li Haihua
    MANUFACTURING SYSTEMS AND INDUSTRY APPLICATIONS, 2011, 267 : 831 - 836
  • [50] VQ-based digital signature scheme for multimedia content authentication
    Sun, QB
    Zhong, D
    Chang, SF
    Wu, JK
    Narasimhalu, D
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS II, 2000, 3971 : 404 - 416