A Hybrid System for Signature Verification
IJCNN '00 Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks (IJCNN'00)-Volume 5 - Volume 5
Practical Cryptography
Protected transmission of biometric user authentication data for oncard-matching
Proceedings of the 2004 ACM symposium on Applied computing
Secrets and Lies: Digital Security in a Networked World
Secrets and Lies: Digital Security in a Networked World
Advanced Studies in Biometrics: Summer School on Biometrics, Alghero, Italy, June 2-6, 2003. Revised Selected Lectures and Papers (Lecture Notes in Computer Science)
Countering Trusting Trust through Diverse Double-Compiling
ACSAC '05 Proceedings of the 21st Annual Computer Security Applications Conference
On diffusion and confusion – why electronic signatures have failed
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
Hi-index | 0.00 |
On the way to a completely electronic workflow, it is necessary to include customer signatures. Legislation in many countries treats electronic signatures similar to handwritten ones. Both are accepted for various purposes such as for finalization of documents, acknowledgement of the document's contents as well as conclusion of agreements. Most important, electronic signatures are accepted as proof of those actions. But customers today often lack knowledge or means to issue them. In this study a business process is described that will produce reliable signatures without the need of previous knowledge or devices on customer side. A threat model for a generic process is described and countermeasures including cryptography, biometric features, tamper-resistant devices, timestamps, signature databases, and others are discussed.