메뉴 건너뛰기




Volumn 41, Issue 5, 2004, Pages 561-575

Digital signature: Use and modification to achieve success in next generational e-business processes

Author keywords

Biometrics technologies; Computer security; Computer verification and authentication; Digital signature; E commerce; Electronic signature; Negotiation support

Indexed keywords

CRYPTOGRAPHY; ELECTRONIC COMMERCE; INFORMATION MANAGEMENT; ONLINE SYSTEMS; SECURITY OF DATA;

EID: 1242331022     PISSN: 03787206     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0378-7206(03)00090-9     Document Type: Article
Times cited : (20)

References (18)
  • 1
    • 1242340857 scopus 로고    scopus 로고
    • Posted at ABA site
    • American Bar Association, Digital Signature Guidelines Tutorial, Posted at ABA site: http://www.abanet.org/scitech/ec/isc/dsg-tutorial.html, 2001.
    • (2001) Digital Signature Guidelines Tutorial
  • 2
    • 0031233424 scopus 로고    scopus 로고
    • Speaker recognition: A tutorial
    • J.P. Campbell Jr., Speaker recognition: a tutorial, Proceedings of the IEEE 85 (9) (1997) 1437-1463.
    • (1997) Proceedings of the IEEE , vol.85 , Issue.9 , pp. 1437-1463
    • Campbell Jr., J.P.1
  • 3
    • 0027700869 scopus 로고
    • High confidence visual recognition of persons by a test of statistical independence
    • Daugman J.G. High confidence visual recognition of persons by a test of statistical independence. IEEE Transactions on Pattern Analysis and Machine Intelligence. 15(11):1993;1148-1161.
    • (1993) IEEE Transactions on Pattern Analysis and Machine Intelligence , vol.15 , Issue.11 , pp. 1148-1161
    • Daugman, J.G.1
  • 4
    • 1242273268 scopus 로고    scopus 로고
    • Security issues for systems used for collecting, storing and interpreting human biological data
    • Harrison D. Security issues for systems used for collecting, storing and interpreting human biological data. Journal of Commercial Biotechnology. 8(4):2002;304-314.
    • (2002) Journal of Commercial Biotechnology , vol.8 , Issue.4 , pp. 304-314
    • Harrison, D.1
  • 6
    • 0031233235 scopus 로고    scopus 로고
    • An identity-authentication system using fingerprints
    • A.K. Jain, L. Hong, S. Pankanti, R. Bolle, An identity-authentication system using fingerprints, Proceedings of the IEEE 85 (9) (1997) 1365-1388.
    • (1997) Proceedings of the IEEE , vol.85 , Issue.9 , pp. 1365-1388
    • Jain, A.K.1    Hong, L.2    Pankanti, S.3    Bolle, R.4
  • 8
    • 0035479209 scopus 로고    scopus 로고
    • Security threats to Internet: A Korean multi-industry investigation
    • Jung B., Han I., Lee S. Security threats to Internet: a Korean multi-industry investigation. Information and Management. 38(8):2001;487-498.
    • (2001) Information and Management , vol.38 , Issue.8 , pp. 487-498
    • Jung, B.1    Han, I.2    Lee, S.3
  • 10
    • 84935529500 scopus 로고
    • Information technology for negotiating groups: Generating options for mutual gain
    • Nunamaker J.F. Jr., Dennis A.R., Valacich J.S., Vogel D.R. Information technology for negotiating groups: generating options for mutual gain. Management Science. 37(10):1991;1325-1346.
    • (1991) Management Science , vol.37 , Issue.10 , pp. 1325-1346
    • Nunamaker Jr., J.F.1    Dennis, A.R.2    Valacich, J.S.3    Vogel, D.R.4
  • 11
    • 0031140709 scopus 로고    scopus 로고
    • Internet security: Firewalls and beyond
    • Oppliger R. Internet security: firewalls and beyond. Communications of the ACM. 40(5):1997;92-102.
    • (1997) Communications of the ACM , vol.40 , Issue.5 , pp. 92-102
    • Oppliger, R.1
  • 12
    • 0031195384 scopus 로고    scopus 로고
    • Using computers to realize joint gains in negotiations: Toward an electronic bargaining table
    • Rangaswamy A., Shell G.R. Using computers to realize joint gains in negotiations: toward an electronic bargaining table. Management Science. 43(8):1997;1147-1163.
    • (1997) Management Science , vol.43 , Issue.8 , pp. 1147-1163
    • Rangaswamy, A.1    Shell, G.R.2
  • 13
    • 0031095932 scopus 로고    scopus 로고
    • Evaluating security threats in mainframe and client/server environments
    • Ryan S.D., Bordoloi B. Evaluating security threats in mainframe and client/server environments. Information and Management. 32(3):1997;137-146.
    • (1997) Information and Management , vol.32 , Issue.3 , pp. 137-146
    • Ryan, S.D.1    Bordoloi, B.2
  • 14
    • 0036616829 scopus 로고    scopus 로고
    • Use of electronic signatures: Past and present
    • Sausser G.D. Use of electronic signatures: past and present. Healthcare Financial Management. 56(6):2002;72-73.
    • (2002) Healthcare Financial Management , vol.56 , Issue.6 , pp. 72-73
    • Sausser, G.D.1
  • 16
    • 0002367759 scopus 로고
    • Electronic document management: Challenges and opportunities for information systems managers
    • Sprague R.H. Electronic document management: challenges and opportunities for information systems managers. MIS Quarterly. 19(1):1995;29-49.
    • (1995) MIS Quarterly , vol.19 , Issue.1 , pp. 29-49
    • Sprague, R.H.1
  • 17
    • 0031236835 scopus 로고    scopus 로고
    • Iris recognition: An emerging biometric technology
    • R.P. Wildes, Iris recognition: an emerging biometric technology, Proceedings of the IEEE 85 (9) (1997) 1348-1364.
    • (1997) Proceedings of the IEEE , vol.85 , Issue.9 , pp. 1348-1364
    • Wildes, R.P.1
  • 18
    • 0031234213 scopus 로고    scopus 로고
    • Face recognition: Eigenface, elastic matching, and neural nets
    • J. Zhang, Y. Yan, M. Lades, Face recognition: eigenface, elastic matching, and neural nets, Proceedings of the IEEE 85 (9) (1997) 1423-1436.
    • (1997) Proceedings of the IEEE , vol.85 , Issue.9 , pp. 1423-1436
    • Zhang, J.1    Yan, Y.2    Lades, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.