Increasingly, encrypted digital signatures are used in e-commerce and in regulatory filings as digital signatures are more secure than a simple generic electronic signature. The concept itself is not new, with common law jurisdictions having recognized telegraph signatures as far back as the mid-19th century and faxed signatures since the 1980s.
In many countries, including the United States, the European Union and Australia, electronic signatures (when recognised under the law of each jurisdiction) have the same legal consequences as the more traditional forms of executing of documents.
This book is your ultimate resource for Electronic Signature. Here you will find the most up-to-date information, analysis, background and everything you need to know.
In easy to read chapters, with extensive references and links to get you to know all there is to know about Electronic Signature right away, covering: Electronic signature, Cryptography, Outline of cryptography, 1dl, Anonymous veto network, Array controller based encryption, Authenticated encryption, Authorization certificate, Autokey cypher, Avalanche effect, Averaging argument, Backdoor (computing), Bent function, Bigram, BLACKER, Blind credential, Blind signature, Blinding (cryptography), Block design, Block size (cryptography), Blom's scheme, BLS (cryptography), Blum-Micali algorithm, Boneh/Franklin scheme, Boolean function, Brown fox code, Burrows-Abadi-Needham logic, Bus encryption, Byzantine fault tolerance, Cardan grille, Chaocipher, Cipher, Cipher runes, Ciphertext, Ciphertext expansion, Ciphertext indistinguishability, Civision, Client-Side Encryption, Clipper chip, Cocks IBE scheme, Code (cryptography), Code word, Codebook, Codress message, Collision resistance, Commitment scheme, Communications security, Comparison of cryptographic hash functions, Completeness (cryptography), Compromise, Computer insecurity, Concrete security, Confusion and diffusion, Conjugate coding, Correlation attack, Correlation immunity, Cover (telecommunications), Cover-coding, Critical Security Parameter, Crypto-politics, Cryptochannel, Cryptographic engineering, Cryptographic hash function, Cryptographic nonce, Cryptographic Service Provider, Cryptographic Test Correction, Portal: Cryptography, CrypTool, Cryptosystem, Cryptovirology, Decipherment, Deniable encryption, Designated verifier signature, Deterministic encryption, Digital credential, Digital signature, Digital signature forgery, Dining cryptographers problem, Diplomatic bag, Direct Anonymous Attestation, Discrete logarithm, EFF DES cracker, Elliptic curve cryptography, Encrypted function, Encryption, End-to-end encryption, Enigma machine, Entropic security, Ephemeral key, Factorization of polynomials over a finite field and irreducibility tests, Feedback with Carry Shift Registers, File camouflage, Floradora...and much more
This book explains in-depth the real drivers and workings of Electronic Signature. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Electronic Signature with the objectivity of experienced professionals.
Or split into 4x interest-free payments of 25% on orders over R50
Learn more
Increasingly, encrypted digital signatures are used in e-commerce and in regulatory filings as digital signatures are more secure than a simple generic electronic signature. The concept itself is not new, with common law jurisdictions having recognized telegraph signatures as far back as the mid-19th century and faxed signatures since the 1980s.
In many countries, including the United States, the European Union and Australia, electronic signatures (when recognised under the law of each jurisdiction) have the same legal consequences as the more traditional forms of executing of documents.
This book is your ultimate resource for Electronic Signature. Here you will find the most up-to-date information, analysis, background and everything you need to know.
In easy to read chapters, with extensive references and links to get you to know all there is to know about Electronic Signature right away, covering: Electronic signature, Cryptography, Outline of cryptography, 1dl, Anonymous veto network, Array controller based encryption, Authenticated encryption, Authorization certificate, Autokey cypher, Avalanche effect, Averaging argument, Backdoor (computing), Bent function, Bigram, BLACKER, Blind credential, Blind signature, Blinding (cryptography), Block design, Block size (cryptography), Blom's scheme, BLS (cryptography), Blum-Micali algorithm, Boneh/Franklin scheme, Boolean function, Brown fox code, Burrows-Abadi-Needham logic, Bus encryption, Byzantine fault tolerance, Cardan grille, Chaocipher, Cipher, Cipher runes, Ciphertext, Ciphertext expansion, Ciphertext indistinguishability, Civision, Client-Side Encryption, Clipper chip, Cocks IBE scheme, Code (cryptography), Code word, Codebook, Codress message, Collision resistance, Commitment scheme, Communications security, Comparison of cryptographic hash functions, Completeness (cryptography), Compromise, Computer insecurity, Concrete security, Confusion and diffusion, Conjugate coding, Correlation attack, Correlation immunity, Cover (telecommunications), Cover-coding, Critical Security Parameter, Crypto-politics, Cryptochannel, Cryptographic engineering, Cryptographic hash function, Cryptographic nonce, Cryptographic Service Provider, Cryptographic Test Correction, Portal: Cryptography, CrypTool, Cryptosystem, Cryptovirology, Decipherment, Deniable encryption, Designated verifier signature, Deterministic encryption, Digital credential, Digital signature, Digital signature forgery, Dining cryptographers problem, Diplomatic bag, Direct Anonymous Attestation, Discrete logarithm, EFF DES cracker, Elliptic curve cryptography, Encrypted function, Encryption, End-to-end encryption, Enigma machine, Entropic security, Ephemeral key, Factorization of polynomials over a finite field and irreducibility tests, Feedback with Carry Shift Registers, File camouflage, Floradora...and much more
This book explains in-depth the real drivers and workings of Electronic Signature. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Electronic Signature with the objectivity of experienced professionals.
Imprint | Tebbo |
Country of origin | Australia |
Release date | June 2011 |
Availability | Supplier out of stock. If you add this item to your wish list we will let you know when it becomes available. |
First published | June 2011 |
Authors | Kevin Roebuck |
Dimensions | 297 x 210 x 27mm (L x W x T) |
Format | Paperback - Trade |
Pages | 522 |
ISBN-13 | 978-1-74304-546-6 |
Barcode | 9781743045466 |
Categories | |
LSN | 1-74304-546-8 |