In this Book

Burdens of Proof
buy this book Buy This Book in Print
summary
An examination of the challenges of establishing the authenticity of electronic documents--in particular the design of a cryptographic equivalent to handwritten signatures.

Table of Contents

  1. Cover
  2. restricted access Download |
  1. Frontmatter
  2. restricted access Download |
  1. Contents
  2. pp. 6-7
  3. restricted access Download |
  1. 1 Introduction
  2. pp. 8-18
  3. restricted access Download |
  1. Plan of the Book
  2. pp. 19-23
  3. restricted access Download |
  1. 2 Communication in the Presence of Adversaries
  2. pp. 24-25
  1. Paper
  2. pp. 26-30
  3. restricted access Download |
  1. Telegraph
  2. pp. 31-32
  3. restricted access Download |
  1. Radio
  2. pp. 33-33
  3. restricted access Download |
  1. Electromechanical Devices
  2. pp. 34-40
  3. restricted access Download |
  1. Networked Computers
  2. pp. 41-42
  3. restricted access Download |
  1. Conclusion
  2. pp. 43-45
  3. restricted access Download |
  1. 3 On the Brink of a Revolution
  2. pp. 46-47
  1. Decentralized Cryptography
  2. pp. 48-53
  3. restricted access Download |
  1. Cryptography and National Security
  2. pp. 54-60
  3. restricted access Download |
  1. Cryptographic Research Programs
  2. pp. 61-66
  3. restricted access Download |
  1. Conclusion
  2. pp. 67-69
  3. restricted access Download |
  1. 4 The Equivalent of a Written Signature
  2. pp. 70-71
  1. The Early History
  2. pp. 72-75
  3. restricted access Download |
  1. Security Services
  2. pp. 76-80
  3. restricted access Download |
  1. Attacks and Adversaries
  2. pp. 81-86
  3. restricted access Download |
  1. Mutations
  2. pp. 87-91
  3. restricted access Download |
  1. Mathematics and the Real World
  2. pp. 92-96
  3. restricted access Download |
  1. Conclusion
  2. pp. 97-99
  3. restricted access Download |
  1. 5 Written Proof
  2. pp. 100-102
  3. restricted access Download |
  1. Contracts
  2. pp. 103-105
  3. restricted access Download |
  1. To Reform or Not to Reform
  2. pp. 106-112
  3. restricted access Download |
  1. Global Signatures
  2. pp. 113-119
  3. restricted access Download |
  1. La Loi du 13 mars 2000
  2. pp. 120-124
  3. restricted access Download |
  1. Conclusion
  2. pp. 125-129
  3. restricted access Download |
  1. 6 Paper and State
  2. pp. 130-134
  3. restricted access Download |
  1. Dematerialized Notaries
  2. pp. 135-146
  3. restricted access Download |
  1. Records of Civil Status
  2. pp. 147-154
  3. restricted access Download |
  1. The Land Registry of Alsace-Moselle
  2. pp. 155-160
  3. restricted access Download |
  1. Conclusion
  2. pp. 161-165
  3. restricted access Download |
  1. 7 The Cryptographic Imagination
  2. pp. 166-168
  3. restricted access Download |
  1. The Random Oracle Model
  2. pp. 169-175
  3. restricted access Download |
  1. Memory
  2. pp. 176-179
  3. restricted access Download |
  1. Perception
  2. pp. 180-185
  3. restricted access Download |
  1. Material Objects
  2. pp. 186-186
  3. restricted access Download |
  1. Cognition
  2. pp. 187-188
  3. restricted access Download |
  1. Conclusion
  2. pp. 189-193
  3. restricted access Download |
  1. 8 Epilogue
  2. pp. 194-197
  3. restricted access Download |
  1. Acknowledgments
  2. pp. 198-199
  3. restricted access Download |
  1. Notes
  2. pp. 200-239
  3. restricted access Download |
  1. Bibliography
  2. pp. 240-261
  3. restricted access Download |
  1. Index
  2. pp. 262-283
  3. restricted access Download |
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.