Listing 1 - 8 of 8 |
Sort by
|
Choose an application
This United Nations publication addresses legal issues related to the use of electronic authentication and signature methods in international electronic commerce. The focus is on fostering trust in digital transactions by examining legal frameworks for electronic signatures and authentication. It discusses the role of third-party certification in digital signatures, particularly in public key infrastructure systems. The publication aims to assist legislators and policymakers, especially in developing countries, by providing a reference document that explores the necessary legal elements for a supportive e-commerce environment. It is intended for legal professionals, policymakers, and international commerce stakeholders.
Electronic commerce --- Digital signatures. --- Law and legislation.
Choose an application
In this updated edition of the well-established practitioner text, Stephen Mason and Daniel Seng have brought together a team of experts in the field to provide an exhaustive treatment of electronic evidence and electronic signatures. This fifth edition continues to follow the tradition in English evidence text books by basing the text on the law of England and Wales, with appropriate citations of relevant case law and legislation from other jurisdictions. Stephen Mason (of the Middle Temple, Barrister) is a leading authority on electronic evidence and electronic signatures, having advised global corporations and governments on these topics. He is also the editor of International Electronic Evidence (British Institute of International and Comparative Law 2008), and he founded the innovative international open access journal Digital Evidence and Electronic Signatures Law Review in 2004. Daniel Seng (Associate Professor, National University of Singapore) is the Director of the Centre for Technology, Robotics, AI and the Law (TRAIL). He teaches and researches information technology law and evidence law. Daniel was previously a partner and head of the technology practice at Messrs Rajah & Tann. He is also an active consultant to the World Intellectual Property Organization, where he has researched, delivered papers and published monographs on copyright exceptions for academic institutions, music copyright in the Asia Pacific and the liability of Internet intermediaries.
Digital signatures --- Law and legislation. --- Electronic signatures --- Signature (Law) --- Law and legislation
Choose an application
In the age of e-society, handwritten signature processing is an enabling technology in a multitude of fields in the "digital agenda" of many countries, ranging from e-health to e-commerce, from e-government to e-justice, from e-democracy to e-banking, and smart cities. Handwritten signatures are very complex signs; they are the result of an elaborate process that depends on the psychophysical state of the signer and the conditions under which the signature apposition process occurs. Notwithstanding, recent efforts from academies and industries now make possible the integration of signature-bas
Choose an application
This publication presents the survey results and policy recommendations of a Nordic study of national eID-systems. The countries that have been studied are Denmark, Finland, Iceland, Norway and Sweden. The aim of the study is to facilitate and lay a foundation for discussions about the similarities and differences in legal, organisational, technical and data approaches taken by the different countries. The survey data has been gathered with the assistance of the members of a project reference group. The data has been analysed and structured into a number of highlighted issues (chapter 1). The highlighted issues have been in turn used as baseline for a set of recommendations (chapter 9). The Nordic Council of Ministers has provided funding and facilitated the staffing of the reference group. The Norwegian Agency for Public Management and e-Government, Difi, has been the project owner and provided project resources.
System analysis. --- Emigration and immigration --- Government policy. --- Network theory --- Systems analysis --- System theory --- Mathematical optimization --- Network analysis --- Network science --- Identification --- Digital signatures --- Border security --- Border control --- Border management --- Boundaries --- Cross-border security --- National security --- Signatures, Digital --- Authentication --- Data encryption (Computer science) --- Forensic identification --- Law and legislation --- Security measures --- E-books
Choose an application
This fourth edition of the well-established practitioner text sets out what constitutes an electronic signature, the form an electronic signature can take, and discusses the issues relating to evidence - illustrated by analysis of relevant case law and legislation from a wide range of common law and civil law jurisdictions. Stephen Mason is a leading authority on electronic signatures and electronic evidence, having advised global corporations and governments on these topics. He is also the editor of Electronic Evidence and International Electronic Evidence, and he founded the international open-source journal Digital Evidence and Electronic Signature Law Review in 2004. This book is also available online at http://ials.sas.ac.uk/digital/humanities-digital-library/observing-law-ials-open-book-service-law.
Digital signatures --- Contracts --- Data encryption (Computer science) --- Law and legislation --- Automation. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Agreements --- Contract law --- Contractual limitations --- Limitations, Contractual --- Commercial law --- Legal instruments --- Obligations (Law) --- Juristic acts --- Liberty of contract --- Third parties (Law) --- Signatures, Digital --- Authentication --- Law and legislation. --- digital --- jurisdiction --- scan --- data protection --- intent --- GDPR --- case law --- Electronic commerce
Choose an application
Group signatures (Computer security) --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Signatures, Group (Computer security) --- Digital signatures --- Protection --- Security measures
Choose an application
Electronic commerce --- Electronic data interchange. --- Digital signatures --- International cooperation. --- Standards. --- United Nations Commission on International Trade Law. --- United States. --- Signatures, Digital --- Authentication --- Data encryption (Computer science) --- Business data interchange, Electronic --- EDI (Electronic data interchange) --- Electronic business data interchange --- Business --- Data transmission systems --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Data processing
Choose an application
Cryptography lies at the heart of most technologies deployed today for secure communications. At the same time, mathematics lies at the heart of cryptography, as cryptographic constructions are based on algebraic scenarios ruled by group or number theoretical laws. Understanding the involved algebraic structures is, thus, essential to design robust cryptographic schemes. This Special Issue is concerned with the interplay between group theory, symmetry and cryptography. The book highlights four exciting areas of research in which these fields intertwine: post-quantum cryptography, coding theory, computational group theory and symmetric cryptography. The articles presented demonstrate the relevance of rigorously analyzing the computational hardness of the mathematical problems used as a base for cryptographic constructions. For instance, decoding problems related to algebraic codes and rewriting problems in non-abelian groups are explored with cryptographic applications in mind. New results on the algebraic properties or symmetric cryptographic tools are also presented, moving ahead in the understanding of their security properties. In addition, post-quantum constructions for digital signatures and key exchange are explored in this Special Issue, exemplifying how (and how not) group theory may be used for developing robust cryptographic tools to withstand quantum attacks.
NP-Completeness --- protocol compiler --- post-quantum cryptography --- Reed–Solomon codes --- key equation --- euclidean algorithm --- permutation group --- t-modified self-shrinking generator --- ideal cipher model --- algorithms in groups --- lightweight cryptography --- generalized self-shrinking generator --- numerical semigroup --- pseudo-random number generator --- symmetry --- pseudorandom permutation --- Berlekamp–Massey algorithm --- semigroup ideal --- algebraic-geometry code --- non-commutative cryptography --- provable security --- Engel words --- block cipher --- cryptography --- beyond birthday bound --- Weierstrass semigroup --- group theory --- braid groups --- statistical randomness tests --- group-based cryptography --- alternating group --- WalnutDSA --- Sugiyama et al. algorithm --- cryptanalysis --- digital signatures --- one-way functions --- key agreement protocol --- error-correcting code --- group key establishment
Listing 1 - 8 of 8 |
Sort by
|