Listing 1 - 10 of 77 | << page >> |
Sort by
|
Choose an application
Choose an application
Choose an application
Olaf Manz's book explores the concept of digital signatures through the lens of algebra, providing a comprehensive overview of how digital signatures are created and verified. It covers essential topics such as the RSA signature, the Euclidean algorithm, and elliptic curves, offering practical insights into the mathematical tools used for digital authentication. The book aims to equip readers with the knowledge to understand and implement digital signatures, emphasizing their significance in securing electronic communications and transactions. It is designed for readers interested in mathematics, computer science, and cybersecurity, offering a clear and concise introduction to the technical aspects of digital signature technology.
Choose an application
This Master’s thesis by Daniel Richter explores the application of emerging digital identity paradigms to improve commercial charging processes in e-mobility. By developing a concept based on Verifiable Credentials and Decentralized Identifiers, the study demonstrates significant changes in registration and process management, emphasizing the importance of integrating wallet software to enhance customer experience. The research highlights modifications in task distribution among service actors and identifies critical data schema issues necessary for the novel approaches. Addressed to both practitioners and early-stage researchers, the thesis provides insights into the practical implications and future development of digital identity systems.
Choose an application
This standard covers specifications of public-key cryptographic techniques for password-based authentication and key establishment, supplemental to the techniques described in IEEE Std 1363-2000 and IEEE Std 1363a-2004. It is intended as a companion standard to IEEE Std 1363-2000 and IEEE Std 1363a-2004. It includes specifications of primitives and schemes designed to utilize passwords and other low-grade secrets as a basis for securing electronic transactions, including schemes for password-authenticated key agreement and password-authenticated key retrieval. Keywords: authentication, key agreement, password, public-key cryptography.
Choose an application
The book offers an overview of the development of e-signature legislation in various countries and contains foreign and international acts related to e-commerce, including the legislation of the Czech Republic, Germany, the UK, the US (state of Utah), Spain and other countries, international law as well as the Bulgarian Draft Law on Electronic Document and Electronic Signature developed by CSD Law Program experts.
Choose an application
Choose an application
Amendment to IEEE Std 1363-2000, this standard specifies additional public-key cryptographic techniques beyond those in IEEE Std 1363-2000. It is intended to be merged with IEEE Std 1363-2000 during future revisions.
Choose an application
Choose an application
Amendment to IEEE Std 1363-2000, this standard specifies additional public-key cryptographic techniques beyond those in IEEE Std 1363-2000. It is intended to be merged with IEEE Std 1363-2000 during future revisions.
Listing 1 - 10 of 77 | << page >> |
Sort by
|