Wiarygodna prezentacji danych do podpisania i weryfikacji
暂无分享,去创建一个
[1] I. El Fray,et al. Authentication protocol for software and hardware components in distributed electronic signature creation system , 2012 .
[2] Armin B. Cremers,et al. Trojan horse attacks on software for electronic signatures , 2002, Informatica.
[3] Mark Bartel,et al. Xml-Signature Syntax and Processing , 2000 .
[4] Jerzy Pejas,et al. Visual Cryptography Methods as a Source of Trustworthiness for the Signature Creation and Verification Systems , 2007, Advances in Information Processing and Protection.