Filters








6,191 Hits in 5.4 sec

Modular Architecture for Adaptable Signature-Creation Tools [chapter]

Vesna Krnjic, Klaus Stranacher, Tobias Kellner, Andreas Fitzek
2013 Lecture Notes in Computer Science  
In particular, electronic signatures fulfilling certain security requirements are legally equivalent to handwritten signatures.  ...  Electronic signatures play an important role in e-Business and e-Government applications.  ...  This Citizen Card Software (CCS) implements a high level interface 5 that provides diverse functionality such as the creation and verification of electronic signatures.  ... 
doi:10.1007/978-3-642-40358-3_23 fatcat:cherd5x3qrgdjgsa2qtni6wjjm

On the Availability and Effectiveness of Open Source Software for Digital Signing of PDF Documents [chapter]

Jonas Gamalielsson, Fredrik Jakobsson, Björn Lundell, Jonas Feist, Tomas Gustavsson, Fredric Landqvist
2015 IFIP Advances in Information and Communication Technology  
Specifically, we characterise the use of digital signatures in Swedish Governmental agencies, report on the interoperability of open source and proprietary licensed software for digital signatures in PDF  ...  documents, and establish the effectiveness of software provided under an open source license for validation of digital signatures in PDF documents.  ...  Second, we report on interoperability of open source and proprietary licensed software for digital signatures in PDF documents.  ... 
doi:10.1007/978-3-319-17837-0_7 fatcat:dhhiifnoejd2vattvteopqtwlu

A taxonomy and survey of attacks on digital signatures

Jorge L. Hernandez-Ardieta, Ana I. Gonzalez-Tablas, Jose M. de Fuentes, Benjamin Ramos
2013 Computers & security  
We consider that it is of the utmost importance to develop appropriate tools and methods to assist in designing and implementing secure systems in a way that reliable digital signatures can be produced  ...  In this paper, a comprehensive taxonomy of attacks on digital signatures is presented, covering both the signature generation and verification phases.  ...  Microarchitectural Analysis (MA) studies the effects of common processor components and their functionalities on the security of software cryptosystems.  ... 
doi:10.1016/j.cose.2012.11.009 fatcat:2vzmgcwwzfbr3hhpnt37cbusou

Digital Signature for data and documents using operating PKI certificates

Adil El Mane, Younes Chihab, Redouan Korchiyne, A. Moumen, N. Mejjad, H. Slimani
2021 SHS Web of Conferences  
The research has the goal of signing PDF documents digitally using the hash-and-sign method.  ...  "The implementation of applications that sign data and files electronically using operating digital certificates" is the central theme of this research.  ...  This PIN is in the format of a four-digit password. The user lunches the signed document in a PDF Reader.  ... 
doi:10.1051/shsconf/202111907004 fatcat:bwxnuiyhkvfbbgq4fojcgwhkjy

Digital signatures with familiar appearance for e-government documents: authentic PDF

T. Neubauer, E. Weippl, S. Biffl
2006 First International Conference on Availability, Reliability and Security (ARES'06)  
Most e-government applications have to find a solution for simple, reliable, secure and authentic signing of official  ...  In this paper we focus on the design, implementation and validation of different solutions for signing PDF documents with a digital qualified signature.  ...  The specification "Digital Signature Appearances" [2] serves as a guideline for implementing the appearance of signatures in PDF documents.  ... 
doi:10.1109/ares.2006.54 dblp:conf/IEEEares/NeubauerWB06 fatcat:butkyefpfbbxrggichrlxeaxom

A Survey of Digital Signing in the Post Quantum Era [article]

Teik Guan Tan, Jianying Zhou
2019 IACR Cryptology ePrint Archive  
Using Shor's algorithm on a large-enough quantum computer, an attacker can cryptanalyze any RSA/ECC public key, and generate fake digital signatures in seconds.  ...  In this paper, we study the use of digital signatures in 14 real-world applications across the financial, critical infrastructure, Internet, and enterprise sectors.  ...  And hardware and software vendors rely on digital signatures to protect the integrity of firmware, libraries, operating system software, and applications running on the billions of servers, laptops, mobile  ... 
dblp:journals/iacr/TanZ19 fatcat:dqdej2srfnbxbeabjcu5s7wm2i

A Public Key Infrastructure Model for Verification of Court Documents: The Judiciary of Kenya

Hellen N. Kabira, Robert O. Oboko
2021 International Journal of Computer Applications  
The objective of this paper is to review the system developed that incorporates Public Key Infrastructure technology and in particular the use of digital signatures to enable the verification of documents  ...  It reviews the existing technical threats on information creation and transmission and addresses the measures implemented to mitigate these. General Terms Public  ...  The research therefore set out to develop a model that uses digital signatures as one of the security measures in documents management for the Judiciary of Kenya.  ... 
doi:10.5120/ijca2021921567 fatcat:kjimimb76vbp3bdreacofpdwfa

An Online Examination Management System for Geographically Dispersed Test Centres to Prevent Question Leakage: A Case Study of Bangladesh

Mohammad Alam, Mohammad Asad, M Mondal
2017 Journal of Scientific Research and Reports  
This work was carried out in collaboration between all authors. Author MSA designed the study and led the discussions on the analysis and the implementation of the project.  ...  Author MIHBA performed the technical analysis, developed the main portion of the web based software. Author MRHM managed the literature searches and wrote the manuscript.  ...  The authors would also like to give their sincere thanks to Delwar Hossain, Joydev Kumar Sana and Mir Abu Toraf of the same institute for their contribution in software development.  ... 
doi:10.9734/jsrr/2017/37178 fatcat:dqzb5hyaxjh5rchgreo4smzsbq

Document specifying rules for the secure use of DCC covering legal aspects of metrology

Pekka Nikander, Tommi Elo, Tuukka Mustapää, Petri Kuosmanen, Kristine Hovhannisyan, Olaf Maennel, Clifford Brown, John Dawkins, Susan Rhodes, Ian Smith, Daniel Hutzschenreuter, Henrike Weber (+3 others)
2020 Zenodo  
State-of-the-art cryptographic methods are presented and applications of these methods for securing and transmitting digital calibration certificates are discussed.  ...  Both, chances and risks of the digital calibration certificate are outlined.  ...  Every time a digital stamping takes place, appropriate queries are initiated to SK.ee. • This digital stamp service used on the PDF DCC is currently based on the Estonian ID-Card Software and is managed  ... 
doi:10.5281/zenodo.3664210 fatcat:luxaqgqc3nayfjluh4rmd7iljm

Electronic Archive Information System

Saulius Ragaisis, Adomas Birstunas, Antanas Mitasiunas, Arunas Stockus
2012 International Baltic Conference on Databases and Information Systems  
The public free software tools for preparation, signing, preview and verification of official electronic documents have played an important role in promoting the usage of electronic documents.  ...  The system is unique not only in Lithuania, but also in Europe.  ...  The authors have played key role in development of all specifications, information systems and tools mentioned in the paper.  ... 
dblp:conf/balt/RagaisisBMS12 fatcat:njbojjcbmvas5docitqshtt3va

Introducing and working with electronic signatures in mass applications: Notaries and the German commercial register

Dominik Gassen
2014 Digital Evidence and Electronic Signature Law Review  
It gets worse if you realize that now more than 800,000 transactions each year will require a considerably higher standard of reliability, security and privacy than what is offered in current internet  ...  It is not a simple task to enable more than 8,600 legal professionals, their offices and staff and more than 500 courts, judges and clerks to move from a paper-based procedure to an electronic one on a  ...  PDF Documents in recent versions could not be supported because readability depended on the use of proprietary software.  ... 
doi:10.14296/deeslr.v5i0.1826 fatcat:uiwn5c3qrfhtrhrwpefmydkta4

Easing PAIN with Digital Signatures

M. Tariq Banday, Author C.G.Dethe
2011 International Journal of Computer Applications  
Digital signature exists as a file on some storage device or is embedded in hardware devices.  ...  It introduces an open source software tool that can be used to study processes, procedures and algorithms used in digital signatures.  ...  India has taken an initiative at government level to make use of digital signature to implement e-governess and e-commerce in a secure manner.  ... 
doi:10.5120/3533-4822 fatcat:2qsuizofa5arpm3brn37bzt7rm

Designing and Implementation of an Online System for Electronic Contract Negotiation Based on Electronic Signature

Juntao Gu, Xiaodong Zhu
2014 Journal of Software  
This architecture is systematically designed on the basis of electronic signature technology to realize online contract signing, electronic contract storage on the trusted third party and online or offline  ...  This paper briefly introduces the status of electronic signature and electronic contract in China, then presents a reference architecture for an online system for electronic contract negotiation and signature  ...  In that sense, Figure 3 illustrates an implementation that one corporate representative applies for digital signature Certificates.  ... 
doi:10.4304/jsw.9.12.3020-3027 fatcat:tbufoo3blba5jeueybcbf2gjya

An Insight of Information Security: A Skeleton

2019 International journal of recent technology and engineering  
The techniques under focus for analyzing were Watermarking, Digital Signatures, Fingerprinting, Cryptography, Steganography and latest being CryptoSteganography Information Security Technique.  ...  This paper analyses various Information Security methods or techniques based on their various characteristics and effectiveness on securing the data from any adversaries.  ...  Digital Signatures A digital signature is used to authenticate an owner and to denote its ownership on the document.  ... 
doi:10.35940/ijrte.c4922.098319 fatcat:7lu4weannffhtdlpn2djmn2eiy

Design and Implementation of an Electronic Document Management System

arkan ismael, Ibrahim Okumus
2017 Mehmet Akif Ersoy Üniversitesi Uygulamalı Bilimler Dergisi  
However, security for documents in the system has not been provided and digital signature is recommended.  ...  . • Security: Digital signature has been used for controlling user's access and document validation.  ... 
doi:10.31200/makuubd.321093 fatcat:mwbbupmdrrdmrduv6n2cbim37a
« Previous Showing results 1 — 15 out of 6,191 results