Narrow your search

Library

KU Leuven (3)

UNamur (2)

KBC (1)

KBR (1)

National Bank of Belgium (1)

UAntwerpen (1)

UCLouvain (1)

UHasselt (1)

ULB (1)

ULiège (1)

More...

Resource type

book (3)


Language

English (3)


Year
From To Submit

2005 (3)

Listing 1 - 3 of 3
Sort by
E-commerce and the law of digital signatures.
Author:
ISBN: 0379215152 9780379215151 Year: 2005 Publisher: Dobbs Ferry Oceana publ.

Loading...
Export citation

Choose an application

Bookmark

Abstract

e-commerce / elektronische handel - digitale / elektronische handtekening - UNCITRAL bespreking van wetgeving in verschillende landen en de Europese Unie bijlage: UNCITRAL * Model Law on Electronic Commerce (1996) * Model Law on Electronic Signatures (2001) * Draft Convention on the Use of Electronic Communications in International Contracts


Book
Guideline for implementing cryptography in the federal government
Authors: --- --- ---
Year: 2005 Publisher: Gaithersburg, Md. : National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This Second Edition of NIST Special Publication (SP) 800-21, updates and replaces the November 1999 edition of Guideline for Implementing Cryptography in the Federal Government. Many of the references and cryptographic techniques contained in the first edition of NIST SP 800-21 have been amended, rescinded, or superseded since its publication. The current publication offers new tools and techniques. NIST SP 800-21 is intended to provide a structured, yet flexible set of guidelines for selecting, specifying, employing, and evaluating cryptographic protection mechanisms in Federal information systems?and thus, makes a significant contribution toward satisfying the security requirements of the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347. The current publication also reflects the elimination of the waiver process by the Federal Information Security Management Act (FISMA) of 2002. SP 800-21 includes background information, describes the advantages of using cryptography; defines the role and use of standards and describes standards organizations that are outside the Federal government; describes the methods that are available for symmetric and asymmetric key cryptography; describes implementation issues (e.g., key management); discusses assessments, including the Cryptographic Module Validation Program (CMVP), the Common Criteria (CC), and Certification and Accreditation (C&A); and describes the process of choosing the types of cryptography to be used and selecting a cryptographic method or methods to fulfill a specific requirement.


Book
Internet international law : international and European studies and comments.
Author:
ISBN: 280271743X 9782802717430 Year: 2005 Publisher: Bruxelles Bruylant

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Economic law --- Colloques --- Colloquia --- Droit international --- Internationaal recht --- Internet --- Law and legislation --- Congresses --- Droit --- Congrès --- Computer networks --- AA / International- internationaal --- EEC / European Union - EU -Europese Unie - Union Européenne - UE --- 347.83 --- NBB congres --- V31 - Droit international privé - Internationaal privaatrecht --- Computer recht. --- Congrès --- DARPA Internet --- Internet (Computer network) --- Wide area networks (Computer networks) --- World Wide Web --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computer recht --- Distributed processing --- Informatique --- Computer science --- Criminalité informatique --- Computer crimes --- Internet - Law and legislation - Congresses --- Internet - Law and legislation - Europe - Congresses --- Computer networks - Law and legislation - Congresses --- Computer networks - Law and legislation - Europe - Congresses --- Acqui 2006 --- Cybercriminalité. --- COMMERCE ELECTRONIQUE --- NOUVELLES TECHNOLOGIES DE L'INFORMATION ET DE LA COMMUNICATION (NTIC) --- SIGNATURE ELECTRONIQUE --- CYBERCRIMINALITE --- COPYRIGHT --- DROIT D'AUTEUR --- PROGRAMMES D'ORDINATEURS --- PROGRAMMES INFORMATIQUES --- DONNEES PERSONNELLES --- DROIT INTERNATIONAL PRIVE --- ARBITRAGE --- EXECPTION AUX DROITS PATRIMONIAUX --- COPIE PRIVEE --- PROTECTION --- CONFLIT DE LOIS --- CONFLITS DE JURIDICTIONS --- Cybercriminalité.

Listing 1 - 3 of 3
Sort by