𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Alternatives for signing electronic documents

✍ Scribed by Benjamin Wright


Publisher
Elsevier Science
Year
1995
Tongue
English
Weight
859 KB
Volume
11
Category
Article
ISSN
0267-3649

No coin nor oath required. For personal study only.

✦ Synopsis


Public-key cryptography provides a mathematical scheme for marking computer data (e.g. an electronic expense voucher or medical record) such that its integrity and origin can be proven. 1 Public-key cryptography involves the use of two keys (special strings of data), a private key and a public key, which are assigned to a user (Alex). Each key bears a complex mathematical relationship to the other. As the name suggests, the private key is intended to be kept secret, so that only Alex can access it. The public key, however, is not intended to be kept secret. It can be published so that outsiders can know it. Suppose, for example, that Alex wants to sign a document for a receiver (Bob) in a way that confirms the document was really signed by Alex. After viewing the document's content, Alex would use his private key and his crypto program to attach a 'digital signature' to the document. The digital signature is a short unit of data that bears a mathematical relationship to the data in the document's content. Bob then could confirm the document's authenticity by using Alex's public key and a crypto program. If the document was not altered between the time Alex signed it and the time Bob confirmed, then the program informs Bob that the document was signed by someone possessing Alex's private key. Bob might infer then that Alex did sign the document. If the program cannot inform that the document was signed with Alex's private key, then Bob infers either that the document was not signed with Alex's private key or that it was changed after it was signed.


πŸ“œ SIMILAR VOLUMES


Alternative ranked set sampling protocol
✍ Γ–mer Γ–ztΓΌrk; Douglas A. Wolfe πŸ“‚ Article πŸ“… 2000 πŸ› Elsevier Science 🌐 English βš– 96 KB

In this paper we investigate the e ects of di erent ranked set sampling protocols on the sign test statistic. Sampling protocols considered include sequential, mid-range and ΓΏxed sampling designs. We show that in all of these sampling protocols the introduction of any correlation structure on the qu

Communication and documentation consider
✍ Ann D. Gaffey πŸ“‚ Article πŸ“… 2009 πŸ› Wiley (John Wiley & Sons) 🌐 English βš– 546 KB

Electronic health records (EHRs) are here to stay, and their use is expected to grow significantly in the future. It is incumbent on risk managers to ensure their use does not inhibit good provider-to-patient communication. Providing education and strategies on how to make the patient encounter mean