• A secure signature creation device (SSCD) is a specific type of computer hardware or software that is used in creating an electronic signature. To be put...
    8 KB (834 words) - 16:02, 5 February 2025
  • level of a qualified electronic signature. By requiring the use of a qualified electronic signature creation device and being based on a certificate...
    45 KB (4,355 words) - 15:36, 24 April 2025
  • with the strictest requirements (advanced electronic signature, secure-signature-creation device, qualified certificate, certification service provider...
    7 KB (792 words) - 13:00, 15 February 2025
  • Thumbnail for Electronic Signatures Directive
    advanced electronic signatures which are based on a qualified certificate and which are created by a secure-signature-creation device: (a) satisfy the legal...
    4 KB (416 words) - 16:34, 5 January 2024
  • real-word identity. By doing a signature, the secure device owner can claim that identity. Thus, the mobile signature is a unique feature for: Proving...
    19 KB (2,307 words) - 08:31, 26 December 2024
  • created by a qualified signature creation device (QSCD). For an electronic signature to be considered as a qualified electronic signature, it must meet three...
    9 KB (1,084 words) - 10:59, 16 February 2025
  • signature generation and issues Signaturprüfschlüssel (signature verification keys) to qualified certificates. The secure signature creative device must...
    8 KB (882 words) - 11:33, 23 October 2021
  • link] (March 2004): secure signature creation devices. Other CWA deals with e-signature; among them: CWA 14170 Signature Creation Process and Environment...
    2 KB (168 words) - 12:34, 4 November 2023
  • Code signing (redirect from Code signature)
    used to authenticate the code signature should be traceable back to a trusted root authority CA, preferably using a secure public key infrastructure (PKI)...
    25 KB (2,646 words) - 11:53, 28 April 2025
  • trusted applications running on the device than a rich operating system (OS) and more functionality than a 'secure element' (SE). The Open Mobile Terminal...
    34 KB (3,140 words) - 21:23, 22 April 2025
  • subject), and the digital signature of an entity that has verified the certificate's contents (called the issuer). If the device examining the certificate...
    49 KB (5,677 words) - 15:35, 13 May 2025
  • Thumbnail for Encryption
    the time of creation is only secure if the encryption device itself has correct keys and has not been tampered with. If an endpoint device has been configured...
    34 KB (3,645 words) - 17:52, 2 May 2025
  • Thumbnail for UEFI
    UEFI (redirect from Windows 8 secure boot)
    systems such as Windows, on the UEFI firmware of the device. UEFI is required for Secure Boot on devices shipping with Windows 8 and above. It is also possible...
    105 KB (10,692 words) - 18:00, 14 May 2025
  • Trusted timestamping is the process of securely keeping track of the creation and modification time of a document. Security here means that no one—not...
    11 KB (1,287 words) - 10:03, 4 April 2025
  • electronic signature. To receive that legal standing, it needs to be doted with a digital certificate, encrypted by a security signature creation device ("qualified...
    9 KB (978 words) - 00:28, 20 May 2024
  • Thumbnail for Authentication
    to copy attempts and can be authenticated with a smartphone. A secure key storage device can be used for authentication in consumer electronics, network...
    35 KB (4,025 words) - 16:38, 17 May 2025
  • Thumbnail for Public key infrastructure
    secret key—methods; Mobile signatures are electronic signatures that are created using a mobile device and rely on signature or certification services...
    35 KB (4,119 words) - 04:22, 26 March 2025
  • password-based authentication. Zero-knowledge proofs based on public-key signature schemes are used to register and authenticate users without the need to...
    30 KB (3,086 words) - 09:15, 16 May 2025
  • Thumbnail for Next-Generation Secure Computing Base
    The Next-Generation Secure Computing Base (NGSCB; codenamed Palladium and also known as Trusted Windows) is a software architecture designed by Microsoft...
    78 KB (7,341 words) - 16:17, 20 January 2025
  • 1960s, secure cryptography was largely the preserve of governments. Two events have since brought it squarely into the public domain: the creation of a...
    53 KB (6,893 words) - 19:25, 5 May 2025
  • recent) OpenPGP specification, trust signatures can be used to support creation of certificate authorities. A trust signature indicates both that the key belongs...
    57 KB (6,315 words) - 18:08, 14 May 2025
  • protocols were proven secure in the so-called random oracle model (or even stronger variants), and the first protocols proven secure under standard assumptions...
    17 KB (1,799 words) - 23:21, 29 December 2024
  • cryptosystem. Elliptic curves are applicable for key agreement, digital signatures, pseudo-random generators and other tasks. Indirectly, they can be used...
    39 KB (4,676 words) - 10:16, 27 April 2025
  • achieve secure key distribution. Ekert's protocol for the key distribution, as it was subsequently shown by Dominic Mayers and Andrew Yao, offers device-independent...
    81 KB (9,073 words) - 05:33, 17 April 2025
  • also create a multitude of files, which can lead to the creation of viruses. Android mobile devices are prone to Trojan-droppers. The banking Trojans also...
    90 KB (11,017 words) - 00:11, 18 May 2025
  • operating system used in Juniper Networks routing, switching and security devices. Junos OS was first made available on 7 July 1998. As of 2008, feature...
    15 KB (1,192 words) - 16:27, 13 March 2025
  • devices connected to or included in said networks, such as routers and switches. All information technology devices and facilities need to be secured...
    18 KB (1,725 words) - 19:07, 26 March 2025
  • Thumbnail for EIDAS
    EIDAS (category Signature)
    electronic signature creation device based on a qualified certificate for electronic signatures. Qualified digital certificate for electronic signature, a certificate...
    27 KB (2,615 words) - 21:52, 1 April 2025
  • the entire computer/device, while "on-access scan" refers to the ability of a product to automatically scan every file at its creation or subsequent modification...
    48 KB (400 words) - 13:40, 16 May 2025
  • 7816 standard. It has a chip based on the technologies of electronic signature, smart card and biometrics, and initially incorporates four software applications:...
    16 KB (1,933 words) - 08:41, 14 May 2025