A secure signature creation device (SSCD) is a specific type of computer hardware or software that is used in creating an electronic signature. To be put...
8 KB (834 words) - 16:02, 5 February 2025
level of a qualified electronic signature. By requiring the use of a qualified electronic signature creation device and being based on a certificate...
45 KB (4,355 words) - 15:36, 24 April 2025
with the strictest requirements (advanced electronic signature, secure-signature-creation device, qualified certificate, certification service provider...
7 KB (792 words) - 13:00, 15 February 2025
advanced electronic signatures which are based on a qualified certificate and which are created by a secure-signature-creation device: (a) satisfy the legal...
4 KB (416 words) - 16:34, 5 January 2024
real-word identity. By doing a signature, the secure device owner can claim that identity. Thus, the mobile signature is a unique feature for: Proving...
19 KB (2,307 words) - 08:31, 26 December 2024
created by a qualified signature creation device (QSCD). For an electronic signature to be considered as a qualified electronic signature, it must meet three...
9 KB (1,084 words) - 10:59, 16 February 2025
signature generation and issues Signaturprüfschlüssel (signature verification keys) to qualified certificates. The secure signature creative device must...
8 KB (882 words) - 11:33, 23 October 2021
link] (March 2004): secure signature creation devices. Other CWA deals with e-signature; among them: CWA 14170 Signature Creation Process and Environment...
2 KB (168 words) - 12:34, 4 November 2023
Code signing (redirect from Code signature)
used to authenticate the code signature should be traceable back to a trusted root authority CA, preferably using a secure public key infrastructure (PKI)...
25 KB (2,646 words) - 11:53, 28 April 2025
Trusted execution environment (redirect from Secure Enclave)
trusted applications running on the device than a rich operating system (OS) and more functionality than a 'secure element' (SE). The Open Mobile Terminal...
34 KB (3,140 words) - 21:23, 22 April 2025
subject), and the digital signature of an entity that has verified the certificate's contents (called the issuer). If the device examining the certificate...
49 KB (5,677 words) - 15:35, 13 May 2025
the time of creation is only secure if the encryption device itself has correct keys and has not been tampered with. If an endpoint device has been configured...
34 KB (3,645 words) - 17:52, 2 May 2025
UEFI (redirect from Windows 8 secure boot)
systems such as Windows, on the UEFI firmware of the device. UEFI is required for Secure Boot on devices shipping with Windows 8 and above. It is also possible...
105 KB (10,692 words) - 18:00, 14 May 2025
Trusted timestamping is the process of securely keeping track of the creation and modification time of a document. Security here means that no one—not...
11 KB (1,287 words) - 10:03, 4 April 2025
electronic signature. To receive that legal standing, it needs to be doted with a digital certificate, encrypted by a security signature creation device ("qualified...
9 KB (978 words) - 00:28, 20 May 2024
to copy attempts and can be authenticated with a smartphone. A secure key storage device can be used for authentication in consumer electronics, network...
35 KB (4,025 words) - 16:38, 17 May 2025
secret key—methods; Mobile signatures are electronic signatures that are created using a mobile device and rely on signature or certification services...
35 KB (4,119 words) - 04:22, 26 March 2025
password-based authentication. Zero-knowledge proofs based on public-key signature schemes are used to register and authenticate users without the need to...
30 KB (3,086 words) - 09:15, 16 May 2025
The Next-Generation Secure Computing Base (NGSCB; codenamed Palladium and also known as Trusted Windows) is a software architecture designed by Microsoft...
78 KB (7,341 words) - 16:17, 20 January 2025
1960s, secure cryptography was largely the preserve of governments. Two events have since brought it squarely into the public domain: the creation of a...
53 KB (6,893 words) - 19:25, 5 May 2025
Pretty Good Privacy (redirect from PGP SIGNATURE)
recent) OpenPGP specification, trust signatures can be used to support creation of certificate authorities. A trust signature indicates both that the key belongs...
57 KB (6,315 words) - 18:08, 14 May 2025
protocols were proven secure in the so-called random oracle model (or even stronger variants), and the first protocols proven secure under standard assumptions...
17 KB (1,799 words) - 23:21, 29 December 2024
cryptosystem. Elliptic curves are applicable for key agreement, digital signatures, pseudo-random generators and other tasks. Indirectly, they can be used...
39 KB (4,676 words) - 10:16, 27 April 2025
Quantum cryptography (redirect from Quantum Secure Direct Communication)
achieve secure key distribution. Ekert's protocol for the key distribution, as it was subsequently shown by Dominic Mayers and Andrew Yao, offers device-independent...
81 KB (9,073 words) - 05:33, 17 April 2025
Mobile security (redirect from Security in Mobile Devices)
also create a multitude of files, which can lead to the creation of viruses. Android mobile devices are prone to Trojan-droppers. The banking Trojans also...
90 KB (11,017 words) - 00:11, 18 May 2025
Junos OS (section Secure boot)
operating system used in Juniper Networks routing, switching and security devices. Junos OS was first made available on 7 July 1998. As of 2008, feature...
15 KB (1,192 words) - 16:27, 13 March 2025
devices connected to or included in said networks, such as routers and switches. All information technology devices and facilities need to be secured...
18 KB (1,725 words) - 19:07, 26 March 2025
EIDAS (category Signature)
electronic signature creation device based on a qualified certificate for electronic signatures. Qualified digital certificate for electronic signature, a certificate...
27 KB (2,615 words) - 21:52, 1 April 2025
the entire computer/device, while "on-access scan" refers to the ability of a product to automatically scan every file at its creation or subsequent modification...
48 KB (400 words) - 13:40, 16 May 2025
National Identity Card (Peru) (section Authentication procedure and electronic signature with the PKI application)
7816 standard. It has a chip based on the technologies of electronic signature, smart card and biometrics, and initially incorporates four software applications:...
16 KB (1,933 words) - 08:41, 14 May 2025