The Electronic Signature Law in Vietnam: a note
نویسندگان
چکیده
منابع مشابه
an analysis to credibility of signature in electronic commerce law
about electronic signatures there are more or less some writings concerning their legal aspect. but in those writings there has been a little attention to credibility and evidential value of the electronic signatures. some questions and ambiguities despite being set before has not been answered at all or answered unsatisfactorily. meanwhile, some authors have made mistakes and some have set tri...
متن کاملA Note on the Strong Law of Large Numbers
Petrov (1996) proved the connection between general moment conditions and the applicability of the strong law of large numbers to a sequence of pairwise independent and identically distributed random variables. This note examines this connection to a sequence of pairwise negative quadrant dependent (NQD) and identically distributed random variables. As a consequence of the main theorem ...
متن کاملA Note on Signature Standards
A major security goal for signature schemes is to prevent an adversary from producing new valid signatures even though he can receive valid signatures of any messages from the legitimate signer. On the one hand the security of elliptic curve signature schemes, as ECDSA, ECGDSA, or ECKCDSA, is based on the elliptic curve discrete logarithm problem, respectively on the security of the used hash f...
متن کاملCivil Responsibility Arising from Electronic Advertising in the Field of Health in Iranian Law
Background and Aim: Internet advertising has a very important role in earning money and business due to the vastness of cyberspace and global and round-theclock access to it. The use of electronic advertising in wards and therapies is also activated for health reasons. The purpose of this study is to investigate the principles of civil liability resulting from misleading propaganda in the field...
متن کاملDouble voter perceptible blind signature based electronic voting protocol
Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Digital Evidence and Electronic Signature Law Review
سال: 2014
ISSN: 2054-8508,1756-4611
DOI: 10.14296/deeslr.v3i0.1780