503 research outputs found

    Электронная цифровая подпись файлов PDF

    Get PDF
    A digital signature is a mathematical scheme for demonstrating the authenticity of a digitalmessage or document. A valid digital signature gives a recipient reason to believe that the message was createdby a known sender, such that the sender cannot deny having sent the message (authentication and nonrepudiation)and that the message was not altered in transit (integrity). Digital signatures are commonly usedfor software distribution, financial transactions, and in other cases where it is important to detect forgery ortampering

    Assuring E-Commerce Business Activities

    Get PDF
    Trust is imperative for conducting online transactions. To reduce online risks and foster trust, assurance service providers, such as TRUSTe, BBBonline, and WebTrust, audit online businesses to assure their compliance with principles and criteria for e-commerce business activities. Of these assurance service providers, WebTrust offers the most comprehensive services, including programs for business to consumer and business to business transactions, certification authorities (CA) and service providers. WebTrust jointly developed by the American Institute of Certified Public Accountants (AICPA) and the Canadian Institute of Chartered Accountants (CICA) offers best practices and a framework of measurable controls for electronic businesses, and thus, fosters online trust and confidence that are critical to the success of electronic commerce. As e-commerce matures, WebTrust will play an increasingly important role in CA-based e-commerce as well as in the applications service provider industry

    Проверка подлинности электронных подписей в PDF файлах

    Get PDF
    A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, such that the sender cannot deny having sent the message (authentication and nonrepudiation) and that the message was not altered in transit (integrity). Digital signatures are commonly used for software distribution, financial transactions, and in other cases where it is important to detect forgery or tampering

    SIGNCRYPTION ANALYZE

    Get PDF
    The aim of this paper is to provide an overview for the research that has been done so far in signcryption area. The paper also presents the extensions for the signcryption scheme and discusses the security in signcryption. The main contribution to this paper represents the implementation of the signcryption algorithm with the examples provided.ElGamal, elliptic curves, encryption, identity-based, proxy-signcryption, public key, ring-signcryption, RSA, signcryption

    The E-Sign Act: The Means to Effectively Facilitate the Growth and Development of E-Commerce

    Get PDF
    In this new world of electronic communications and digital information technology, e-commerce is not only forcing companies to redefine the means of conducting their business, but it is also changing the basic legal infrastructure. There is currently an enormous amount of activity underway by the states to clarify the law regarding the conduct of e-commerce transactions. Though the various state legislative initiatives, including the Uniform Electronic Transactions Act, show an agreement among the states to develop a legal infrastructure that will support the use of security procedures with the public policy goal of further facilitating the growth and development of e-commerce, there is little agreement among the states on how to attain such a goal. Unlike the current state electronic signature legislation, the E-Sign Act provides three key components, uniformity, flexibility, and predictability, and will prove to be the means to successfully facilitate the growth and development of e-commerce

    Paper-based Verification Design of Trade Business License in Indonesia

    Get PDF
    The trade business license certificate (SIUP) is a paper-based license to conduct trade businesses in Indonesia issued by the government. Until today, there is no mechanism for verifying the validity of document unless to verify it manually. The current paper presents a design that allows paper-based verification of the printed trade business license. It aims to provide the verification mechanism and ensure the document validity. Our design implemented digital signature with QR Code image that placed into the document and the digital certificate issued by a certification authority (CA). The proposed scheme generated 442Bytes of data and version 14 of QR Code to scan easily by a reader device. The experimental result indicates that our scheme is easy and feasible to implement in Indonesia with guaranteed the document integrity, authentication, and nonrepudiation

    Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities

    Get PDF
    Edge computing is a promising paradigm that enhances the capabilities of cloud computing. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from all kinds of security and privacy breaches. The security and privacy issues associated with the edge computing environment have narrowed the overall acceptance of the technology as a reliable paradigm. Many researchers have reviewed security and privacy issues in edge computing, but not all have fully investigated the security and privacy requirements. Security and privacy requirements are the objectives that indicate the capabilities as well as functions a system performs in eliminating certain security and privacy vulnerabilities. The paper aims to substantially review the security and privacy requirements of the edge computing and the various technological methods employed by the techniques used in curbing the threats, with the aim of helping future researchers in identifying research opportunities. This paper investigate the current studies and highlights the following: (1) the classification of security and privacy requirements in edge computing, (2) the state of the art techniques deployed in curbing the security and privacy threats, (3) the trends of technological methods employed by the techniques, (4) the metrics used for evaluating the performance of the techniques, (5) the taxonomy of attacks affecting the edge network, and the corresponding technological trend employed in mitigating the attacks, and, (6) research opportunities for future researchers in the area of edge computing security and privacy
    corecore