Trusted timestamping

Results: 28



#Item
1Public-key cryptography / Records management technology / Notary / Key management / Signature / Digital signature / Trusted timestamping / Digital Postmarks / Enterprise content management

Digital signature services for users Improving user experience to support trust among work partners Lorraine Tosi 1,2 Aurélien Bénel 1

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-07-03 02:38:49
2Digital signature / Public key certificate / Public key infrastructure / Authentication / Records management / Certificate authority / Cryptographic protocol / Digital Postmarks / Trusted timestamping / Cryptography / Public-key cryptography / Key management

時刻認証基盤ガイドライン

Add to Reading List

Source URL: www.dekyo.or.jp

Language: English - Date: 2015-06-17 21:01:44
3Cryptographic protocols / Hashing / Replay attack / Security token / RSA / SHA-1 / Trusted timestamping / Interlock protocol / Digital signature / Cryptography / Public-key cryptography / Cryptographic hash functions

Automatic Event-Stream Notarization Using Digital Signatures Bruce Schneier John Kelsey

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
4Cryptographic hash functions / Computer security / Hash tree / Peer-to-peer / Trusted timestamping / Hash function / Digital signature / Hash list / Linked timestamping / Cryptography / Hashing / Error detection and correction

Keyless Signatures’ Infrastructure: How to Build Global Distributed Hash-Trees Ahto Buldas1,2 , Andres Kroonmaa1 , and Risto Laanoja1,2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-15 18:39:49
5Computer network security / Email / Trusted timestamping / Tamper-evident / Timestamp / Digital signature / Internet security / Cryptography / Time / Electronic documents

for FINANCIAL ADVISORS Safeguard the integrity of financial records and prove transaction authenticity to regulators, auditors, counsel and clients

Add to Reading List

Source URL: www.proofspace.com

Language: English - Date: 2013-06-11 17:06:24
6Spamming / Computer network security / Key management / Public-key cryptography / Trusted timestamping / Internet security / Ü / Certificate authority / Cyberwarfare / Email / Computing / Internet

PDF Document

Add to Reading List

Source URL: www.proofspace.com

Language: English - Date: 2013-06-11 17:07:36
7Ü / Paperless office / Public-key cryptography / Business / Security / Environment / Computer security / Time / Trusted timestamping

P r o o f m ar k f o r des k t o p Cost-effectively safeguard the integrity of your documents and prove the authenticity of electronic records to clients,

Add to Reading List

Source URL: www.proofspace.com

Language: English - Date: 2013-06-11 17:07:31
8Notary / Time / Trusted timestamping / Authentication / Electronic business / Security / Computer security / Civil law

for FINANCIAL SERVICES What if Your Archives Don’t Cut It in Court?

Add to Reading List

Source URL: www.proofspace.com

Language: English - Date: 2013-06-11 17:07:45
9Time / Civil law / Notary / Electronic documents / Aesthetics / Trusted timestamping / Tamper-evident / Timestamp / Authentication / Cryptography / Security / Packaging

for C O U N S E L Safeguard the integrity of legal records and prove the authenticity of evidence to clients, auditors, and courts. Can you reliably prevail

Add to Reading List

Source URL: www.proofspace.com

Language: English - Date: 2013-06-11 17:07:41
10Computing / Software / Security / Proprietary software / Symantec / Enterprise Vault / Trusted timestamping

for S y mantec Enterprise Vault Easily prove evidentiary authenticity & good corporate conduct to courts and regulators over the lifecycle of electronically stored information. Introducing ProofMark from ProofSpace

Add to Reading List

Source URL: www.proofspace.com

Language: English - Date: 2013-06-11 17:07:43
UPDATE