Assessing trust in the long-term protection of documents

M Vigil, D Cabarcas, J Buchmann… - 2013 IEEE Symposium …, 2013 - ieeexplore.ieee.org
Digital archives rely on trusted parties, such as certification authorities, to ensure
authenticity, integrity and proof of existence protection for documents. In this paper, we …

A user-centric digital signature scheme

FC Werlang, RF Custódio, MAG Vigil - Public Key Infrastructures, Services …, 2014 - Springer
We observe that current mainstream digital signature schemes are complex and
inconvenient for end users. We group the main problems related to these schemes and …

Techniques to certify integrity and proof of existence for a periodical re-encryption-based long-term archival systems

AH Shanthakumara, NR Sunitha - Proceedings of International Symposium …, 2018 - Springer
The periodical re-encryption-based archival systems have many specific characteristics
such as actively re-encrypting the stored data objects periodically with or without conscious …

[PDF][PDF] DEPARTAMENTO DE CIENCIAS DE LA COMPUTACIÓN

JI MENDOZA MACIAS - repositorio.espe.edu.ec
Este documento describe la experiencia en desarrollar una aplicación de Time Stamping
para el proceso de Factoring Electrónico en el Ecuador, la cual permite realizar el proceso …

[PDF][PDF] Content Integrity System and Notarisation for Long-Term Protection of Data Objects

K und Computeralgebra - 2013 - Citeseer
Guarantee of authenticity, integrity and datedness is necessary to rely on digital data
objects. In literature, there are several solutions which offer these guarantees in the long …