Computers at risk: safe computing in the information age
Computers at risk: safe computing in the information age
Computer security basics
Encryption: a few cryptic remarks
ACM SIGSAC Review
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Law of Electronic Commerce: EDI, Fax, and E-Mail: Technology, Proof, and Liability
Law of Electronic Commerce: EDI, Fax, and E-Mail: Technology, Proof, and Liability
Accountability in Electronic Commerce Protocols
IEEE Transactions on Software Engineering
Privacy policy enforcement for ambient ubiquitous services
AmI'10 Proceedings of the First international joint conference on Ambient intelligence
PPINA – a forensic investigation protocol for privacy enhancing technologies
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Hi-index | 0.00 |
Digital Signature (DS) technology may be employed to produce legally enforceable signatures in Electronic Data Interchange (EDI) among computer users within the same general guidelines and requirements as those developed for handwritten signatures on paper. Digital signature technology promises assurance at least equal to written signatures. From a legal standpoint, this assurance remains to be tested in the evidentiary process. Business policies for organizational use of this technology are being created as the use of digital signature technology is adopted. Standard industry practice serves to create and document a legal precedent. Digital signatures are especially applicable to interpretations of contracts and statute of fraud law. Digital signatures may be used to provide assurances in distributed and networked computer environments where electronic transactions require a high degree of trust.