Abstract: Problems of technical implementation of the government-procurements legal relations in context of electronic document flow are considered. The review of Public Key Infrastructure (PKI), in particular technology of the electronic digital signature, is given. Information protection in PKI is based on a method of asymmetrical cryptography with usage of pair keys — public and private. The law of the Russian Federation on the electronic digital signature and its conformity to the PKI international standards are considered. The ways to use PKI providing adequate technical implementation of legal relations in electronic government procurement system are offered.Note: Research direction:Programming, parallel computing,...
In an organization with its own Private Network , it is not just enough to transfer the documents fr...
The theme of the bachelor thesis includes the issue of electronic signature and its definition at th...
The paper proposes a short comparative analysis of the contemporary models of public key infrastruct...
This paper describes Public Key Infrastructure (PKI). It is a platform for the realization of secure...
Using the case study method, the study examines the prospects and initiatives of the state that can ...
For more than a decade, the separate fields of legislation and cryptography have contributed to the ...
The restrictions on the movement of persons imposed during the pandemic have highlighted that the wh...
Includes bibliographical references (page 31).Security for electronic commerce has become increasing...
In an organization with its own Private Network, it is not just enough to transfer the documents fro...
The provision of state services in electronic form today is one of the innovative directions of deve...
Submitted in partial fulfillment of the requirements for the Degree of Master of Science in Informa...
This article presents areas of possible implementations of the PKI (Public Key Infrastructure) and a...
The use of insecure networks -such as the Internet- to send and receive information has made the nee...
The work deals with the electronic signature and its use in the e-government between the state and c...
The contribution analyses a specific role and character of electronic signatures and electronic acts...
In an organization with its own Private Network , it is not just enough to transfer the documents fr...
The theme of the bachelor thesis includes the issue of electronic signature and its definition at th...
The paper proposes a short comparative analysis of the contemporary models of public key infrastruct...
This paper describes Public Key Infrastructure (PKI). It is a platform for the realization of secure...
Using the case study method, the study examines the prospects and initiatives of the state that can ...
For more than a decade, the separate fields of legislation and cryptography have contributed to the ...
The restrictions on the movement of persons imposed during the pandemic have highlighted that the wh...
Includes bibliographical references (page 31).Security for electronic commerce has become increasing...
In an organization with its own Private Network, it is not just enough to transfer the documents fro...
The provision of state services in electronic form today is one of the innovative directions of deve...
Submitted in partial fulfillment of the requirements for the Degree of Master of Science in Informa...
This article presents areas of possible implementations of the PKI (Public Key Infrastructure) and a...
The use of insecure networks -such as the Internet- to send and receive information has made the nee...
The work deals with the electronic signature and its use in the e-government between the state and c...
The contribution analyses a specific role and character of electronic signatures and electronic acts...
In an organization with its own Private Network , it is not just enough to transfer the documents fr...
The theme of the bachelor thesis includes the issue of electronic signature and its definition at th...
The paper proposes a short comparative analysis of the contemporary models of public key infrastruct...