Proceedings of the 2015 2nd International Conference on Electronic Governance and Open Society: Challenges in Eurasia 2015
DOI: 10.1145/2846012.2846014
|View full text |Cite
|
Sign up to set email alerts
|

An Approach towards Digital Signatures for e-Governance in India

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
8
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
1
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 14 publications
0
8
0
Order By: Relevance
“…Different authentication protocols to test are adopted by the various departments for their projects. For authentication, identification is important because, ultimately, the identity of the user will be proved in the authentication [37,56]. e proposed protocols and methods identified in NeAF are as follows:…”
Section: Authentication Protocols E Organizations Build Information and Communication Technology-(ict-) Basedmentioning
confidence: 99%
“…Different authentication protocols to test are adopted by the various departments for their projects. For authentication, identification is important because, ultimately, the identity of the user will be proved in the authentication [37,56]. e proposed protocols and methods identified in NeAF are as follows:…”
Section: Authentication Protocols E Organizations Build Information and Communication Technology-(ict-) Basedmentioning
confidence: 99%
“…There are now more than 600 CAs in more than 50 countries [24]. The CA is a single point of failure [ 14] and rogue certi cates can be issued with malicious intent, affecting the entire PKI [TOR,08].…”
Section: B) Managing the Private Keysmentioning
confidence: 99%
“…Wang, Bai and Hu, 2015 suggest several signature approaches to make the certi cation process go as long as one of the certi cate authorities is not compromised. A Paper-Based Approach to Electronic Governance Electronic Signatures in India [24] Electronic signatures are stored in HSMs and smart cards can be lost.…”
Section: B) Managing the Private Keysmentioning
confidence: 99%
See 1 more Smart Citation
“…This system uses a layered security structure with combined technologies, including a usage control scheme called Enterprise Digital Right Management (E-DRM) to prevent the illegal use and leaking of data, a counterfeit prevention technology using a 2-D bar code to prevent illegal data modification and a Public Key (PKI) scheme to ensure the authenticity of the data [27]. • A prototype is being tested by the government of India in that the proposal is an integrated digital signature approach based on cloud computing to enable electronic authentication and data security in the transaction phase of digitized services [42].…”
mentioning
confidence: 99%