Open Access
Issue |
SHS Web Conf.
Volume 119, 2021
3rd International Conference on Quantitative and Qualitative Methods for Social Sciences (QQR’21)
|
|
---|---|---|
Article Number | 07004 | |
Number of page(s) | 9 | |
Section | Technology and Society / Covid-19 Innovations | |
DOI | https://doi.org/10.1051/shsconf/202111907004 | |
Published online | 24 August 2021 |
- S. Mason, Electronic Signatures in Law, chapter 1: The Signature, 9 (2003) [Google Scholar]
- S. Mason, Electronic Signatures in Law, chapter 2: International initiatives, 101–102 (2003) [Google Scholar]
- J. Katz, Digital Signatures, Digital Signatures: Background and Definitions, 3 (2010) [Google Scholar]
- B. Pfitzmann, Digital Signature Schemes: General Framework and Fail-Stop Signatures, Requirements on digital signature schemes, 2 (1996) [Google Scholar]
- L. El Aimani, Verifiable Composition of Signature and Encryption: A Comprehensive Study of the Design Paradigms, Preliminaries, 3–4 (2017) [Google Scholar]
- S. Mason, Electronic Signatures in Law, chapter 3: The practical issues in using electronic signatures in differentjurisdictions, 127 (2003) [Google Scholar]
- S. Katzenbeisser, Recent Advances in RSA Cryptography, chapter: Public Key Cryptography and RSA-Type Cryptosystems, 25 (2001) [Google Scholar]
- S. Rubinstein-Salzedo, Cryptography, Chapter: The RSA Cryptosystem, 113 (2018) [Google Scholar]
- S. Y. Yan, Cryptanalytic Attacks on RSA, Chapter: RSA Public-Key Cryptography, 55–56 (2008) [Google Scholar]
- A. A. Smith, U. Whitcher, Making a Hash of Things, Math Horizons, 23, 5–9 (2015) [Google Scholar]
- R. Avanzi, L. Keliher, F. Sica, Selected Areas in Cryptography, Chapter Collisions and Other Non-random Properties for Step-Reduced SHA-256, 277 (2009) [Google Scholar]
- A. A. Smith, U. Whitcher, Making a Hash of Things, Math Horizons, 23, 5–9 (2015) [CrossRef] [Google Scholar]
- D. I. Nassr, Secure Hash Algorithm-2 formed on DNA, Journal of the Egyptian Mathematical Society, (2019) [Google Scholar]
- E. Damiani, C. A. Ardagna, N. El Ioini, Open-Source Systems Security Certification, Chapter: Test-based security certifications, 27–28 (2009) [Google Scholar]
- B. Crispo, B. Christianson, J. A. Malcolm et M. Roe, Security Protocols, Chapter Review and Revocation of Access Privileges Distributed with PKI Certificates, 100 (2001) [Google Scholar]
- W. R. Simpson, Enterprise Level Security: Securing information systems in an uncertain world, Chapter8: Claims-BasedAuthentication, 1, 103 (2016) [Google Scholar]
- A. Karamanian, F. Dessart, S. Tenneti, PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks, Cisco Press, 19–23 (2011) [Google Scholar]
- S. Mason, Electronic Signatures in Law 3rd edition, chapter 14: Digital signatures, 283 (2012) [Google Scholar]
- Y. C. Elloh Adja, B. Hammi, A. Serhrouchni, S. Zeadally, A blockchain-based certificate revocation management and status verification system, (2021) [Google Scholar]
- P. Degano, L. Vigano, Foundations and Applications of Security Analysis, Chapter: Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data, 92–93 (2009) [Google Scholar]
- P. Degano, L. Vigano, Foundations and Applications of Security Analysis, Chapter: Towards a Type System for Security APIs, 174 (2009) [Google Scholar]
- R. Focardi, A. Myers, Principles of Security and Trust, Chapter: Automated Backward Analysis of PKCS#11 v2.20, 219 (2015) [Google Scholar]
- A. Karamanian, F. Dessart, S. Tenneti, PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks, Cisco Press, 34 (2011) [Google Scholar]
- F. Pop, C. Dobre, D. Popescu, V. Ciobanu, V. Cristea, Digital Certificate Management for Document Workflows in E-Government Services, International Conference on Electronic Government EGOV, (2010). [Google Scholar]
- C. Chou, W. C. Cheng, L. Golubchik, Performance study of online batch-based digital signature schemes, Journal of Network and Computer Applications, 33, 98114 (2010) [CrossRef] [Google Scholar]
- Y. Lin, X. Maozhi, Z. Zhiming, Digital signature systems based on smart card and fingerprint feature, Journal of Systems Engineering and Electronics, 18, 825–834 (2007) [CrossRef] [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.