Electronic signatures are not a new invention; the theory behind them has been around for more than 25 years. Yet, their practical application has not become massively widespread to the present day, and Hungary constitutes no difference in that respect. In addition to providing an outline of the present context of electronic signatures, the study goes thoroughly into the conditions of applicability, from a functional point of view, and fitted into the conditions of Hungarian society. A separate chapter examines the issue of security, as one of the most important conditions of applicability. Security is explored also from an encryption and IT perspective, demonstrating the fact that there is yet enough to be done until full acceptance is ach...
These days information technologies improve rapidly in raising information society and opening wide ...
The paper aims to emphasize the particularities of the electronic signature by reference to the nat...
Authentication is a crucial aspect of IT systems. It is the process that protects personal data and ...
Electronic signatures are not a new invention; the theory behind them has been around for more than ...
Electronic signatures are not a new invention; the theory behind them has been around for more than ...
Abstract. We recall the technical background of electronic signatures, at least the ones widely used...
Electronic Signature‘s benefit is obvious. Nearly eight years have already past since European Parli...
The topic of this work is electronic signatures and their use in the European Union, while considera...
The work deals with the electronic signature and its use in the e-government between the state and c...
The author put emphasis on the explanation of some marginal aspects of the Czech Electronic Signatur...
The purpose of this work is to summarize current knowledge of the electronic signature and to outlin...
For more than a decade, the separate fields of legislation and cryptography have contributed to the ...
This article explains some of the important issue of electronic signature. Discussed are the dynamic...
This paper deals with the legislative and technical aspects, concerning the electronic signature and...
Electronic signature is more and more used technology. This work should get near us its function and...
These days information technologies improve rapidly in raising information society and opening wide ...
The paper aims to emphasize the particularities of the electronic signature by reference to the nat...
Authentication is a crucial aspect of IT systems. It is the process that protects personal data and ...
Electronic signatures are not a new invention; the theory behind them has been around for more than ...
Electronic signatures are not a new invention; the theory behind them has been around for more than ...
Abstract. We recall the technical background of electronic signatures, at least the ones widely used...
Electronic Signature‘s benefit is obvious. Nearly eight years have already past since European Parli...
The topic of this work is electronic signatures and their use in the European Union, while considera...
The work deals with the electronic signature and its use in the e-government between the state and c...
The author put emphasis on the explanation of some marginal aspects of the Czech Electronic Signatur...
The purpose of this work is to summarize current knowledge of the electronic signature and to outlin...
For more than a decade, the separate fields of legislation and cryptography have contributed to the ...
This article explains some of the important issue of electronic signature. Discussed are the dynamic...
This paper deals with the legislative and technical aspects, concerning the electronic signature and...
Electronic signature is more and more used technology. This work should get near us its function and...
These days information technologies improve rapidly in raising information society and opening wide ...
The paper aims to emphasize the particularities of the electronic signature by reference to the nat...
Authentication is a crucial aspect of IT systems. It is the process that protects personal data and ...