Results 21 to 30 of about 87,506 (306)

PENGAKUAN TANDATANGAN PADA DOKUMEN ELEKTRONIK DALAM PEMBUKTIAN HUKUM ACARA PERDATA DI INDONESIA

open access: yesSASI, 2010
The use of an electronic signature on an electronic document may guarantee he security of an electronic information message, using public network, because the electronic is created based on the asymmetric cryptography technology. From the research, there
Fransiscus Xaverius Vincent Roger Letsoin
doaj   +1 more source

Blind electronic signature on elliptic curves method: conditions and requirements

open access: yesНаука. Инновации. Технологии, 2022
The work is devoted to consideration the blind electronic signature method based on algorithm, described in DSTU ISO/IEC 14888-3:2014 (EC DSA). The blind electronic signatures protocol mathematical model based on a standard electronic signature algorithm
Ivan Dmitrievich Gorbenko   +2 more
doaj  

Electronic bonds and ways to challenge their validity - a comparative study [PDF]

open access: yesالرافدین للحقوق, 2020
The Electronic bonds are editors that contain integrated, stored, sent or received data that archived electronically or by any other similar means that may be an email, telegram, telex or telecopy associated with an electrostatic signature authenticated ...
Tymya al sraff
doaj   +1 more source

The electronic identification, signature and security of information systems [PDF]

open access: yesActa Montanistica Slovaca, 2002
The contribution deals with the actual methods and technologies of information and communication systems security. It introduces the overview of electronic identification elements such as static password, dynamic password and single sign-on.
Horovèák Pavel
doaj  

Bargaining with the use of electronic form

open access: yesПроблеми Законності, 2017
The article analyzes the electronic form and how it relates to the concept of the forms of transactions. The author notices that Ukrainian legislation determines the place of the electronic form in the system of forms of transactions in different ways ...
Наталья Филатова
doaj   +1 more source

E-invoice authenticity verification scheme based on signature verification

open access: yes网络与信息安全学报, 2019
With the rapid development of network and information technology, paperless and electronic have become the development trend of today's economic life.
XIE Rongna, MAO Weihua, SHI Guozhen
doaj   +3 more sources

Self-identification of electronically scanned signatures (ESS) and digitally constructed signatures (DCS)

open access: yesForensic Sciences Research, 2021
The use of electronic signatures as a form of identification is increasingly common, yet they have been shown to lack the dynamic features found in online signatures.
Zuzanna Kazmierczyk, Ian J. Turner
doaj   +1 more source

Generation and verification method of trusted signature seal incorporating handwriting features

open access: yes网络与信息安全学报
With the rapid development of electronic communication and internet technology, the digitization of document circulation and processing has become increasingly prevalent.The trend towards greater convenience, flexibility, and diversity in electronic ...
Li LI   +4 more
doaj   +3 more sources

A Short Linearly Homomorphic Proxy Signature Scheme

open access: yesIEEE Access, 2018
Linearly homomorphic signature schemes allow the performance of linear computations on authenticated data. They are important primitives for many applications, such as electronic voting, smart grids, electronic health records, and so on.
Qun Lin   +4 more
doaj   +1 more source

A Study of Legal Rules Applicable to Electronic bill of exchange [PDF]

open access: yesپژوهش‌نامه حقوق اسلامی, 2014
Nowadays, electronic commercial instruments can be easily used in Cyberspace. Electronic bill of exchange is also one of these instruments. Efforts have been made in UNCITRAL towards creating a suitable field for increasing electronic commercial ...
Mohammad Sardooeinasab, Ahad Taheri
doaj   +1 more source

Home - About - Disclaimer - Privacy