We cannot verify your location
Browse Book and Journal Content on Project MUSE
OR

Burdens of Proof

Cryptographic Culture and Evidence Law in the Age of Electronic Documents

Jean-Fran├žois Blanchette

Publication Year: 2012

An examination of the challenges of establishing the authenticity of electronic documents--in particular the design of a cryptographic equivalent to handwritten signatures.

Published by: The MIT Press

Contents

pdf iconDownload PDF (40.4 KB)
pp. 6-7

1 Introduction

pdf iconDownload PDF (2.8 MB)
pp. 8-18

Plan of the Book

pdf iconDownload PDF (71.2 KB)
pp. 19-23

2 Communication in the Presence of Adversaries

Paper

pdf iconDownload PDF (74.4 KB)
pp. 26-30

Telegraph

pdf iconDownload PDF (66.5 KB)
pp. 31-32

Radio

pdf iconDownload PDF (42.7 KB)
p. 33-33

Electromechanical Devices

pdf iconDownload PDF (79.5 KB)
pp. 34-40

Networked Computers

pdf iconDownload PDF (66.6 KB)
pp. 41-42

Conclusion

pdf iconDownload PDF (85.5 KB)
pp. 43-45

3 On the Brink of a Revolution

Decentralized Cryptography

pdf iconDownload PDF (638.1 KB)
pp. 48-53

Cryptography and National Security

pdf iconDownload PDF (1.3 MB)
pp. 54-60

Cryptographic Research Programs

pdf iconDownload PDF (76.7 KB)
pp. 61-66

Conclusion

pdf iconDownload PDF (45.1 KB)
pp. 67-69

4 The Equivalent of a Written Signature

The Early History

pdf iconDownload PDF (439.6 KB)
pp. 72-75

Security Services

pdf iconDownload PDF (688.4 KB)
pp. 76-80

Attacks and Adversaries

pdf iconDownload PDF (137.5 KB)
pp. 81-86

Mutations

pdf iconDownload PDF (74.5 KB)
pp. 87-91

Mathematics and the Real World

pdf iconDownload PDF (74.8 KB)
pp. 92-96

Conclusion

pdf iconDownload PDF (68.1 KB)
pp. 97-99

5 Written Proof

pdf iconDownload PDF (68.9 KB)
pp. 100-102

Contracts

pdf iconDownload PDF (69.0 KB)
pp. 103-105

To Reform or Not to Reform

pdf iconDownload PDF (78.5 KB)
pp. 106-112

Global Signatures

pdf iconDownload PDF (78.3 KB)
pp. 113-119

La Loi du 13 mars 2000

pdf iconDownload PDF (738.1 KB)
pp. 120-124

Conclusion

pdf iconDownload PDF (71.9 KB)
pp. 125-129

6 Paper and State

pdf iconDownload PDF (74.4 KB)
pp. 130-134

Dematerialized Notaries

pdf iconDownload PDF (3.6 MB)
pp. 135-146

Records of Civil Status

pdf iconDownload PDF (3.6 MB)
pp. 147-154

The Land Registry of Alsace-Moselle

pdf iconDownload PDF (1.9 MB)
pp. 155-160

Conclusion

pdf iconDownload PDF (72.8 KB)
pp. 161-165

7 The Cryptographic Imagination

pdf iconDownload PDF (1.4 MB)
pp. 166-168

The Random Oracle Model

pdf iconDownload PDF (80.1 KB)
pp. 169-175

Memory

pdf iconDownload PDF (109.4 KB)
pp. 176-179

Perception

pdf iconDownload PDF (1.0 MB)
pp. 180-185

Material Objects

pdf iconDownload PDF (63.8 KB)
p. 186-186

Cognition

pdf iconDownload PDF (66.5 KB)
pp. 187-188

Conclusion

pdf iconDownload PDF (70.5 KB)
pp. 189-193

8 Epilogue

pdf iconDownload PDF (70.6 KB)
pp. 194-197

Acknowledgments

pdf iconDownload PDF (64.3 KB)
pp. 198-199

Notes

pdf iconDownload PDF (182.8 KB)
pp. 200-239

Bibliography

pdf iconDownload PDF (144.7 KB)
pp. 240-261

Index

pdf iconDownload PDF (115.2 KB)
pp. 262-283


E-ISBN-13: 9780262301565
Print-ISBN-13: 9780262017510

Page Count: 288
Publication Year: 2012

Research Areas

Recommend

UPCC logo

Subject Headings

  • Electronic evidence.
  • Data encryption (Computer science) -- Law and legislation.
  • You have access to this content
  • Free sample
  • Open Access
  • Restricted Access