Language:
English
US
China
Cart
0
Login/Create Portal Account
All Products
All Products
Books
Journals
Videos
Book Chapters
Journal Articles
Video Lessons
Teaching Cases
Special Offers
All IGI Global Scholarly Journals Shift to Open Access
Following the first conversion of a portion of IGI Global’s hybrid open access/subscription-based journals to gold open access (OA) in 2021, and then again in 2022, IGI Global is pleased to announce that the remainder of their hybrid open access/subscription-based journal collection will officially convert to gold OA beginning January 1st, 2023.
Learn More
IGI Global’s New Emerging Topic e-Book Collections
Acquire highly focused and affordable Cutting-Edge Peer-Reviewed Research Content through a selection of 17 topic-focused e-Book Collections discounted up to 90%, compared to list prices. Collection topics include Diversity, Equity, and Inclusion (DEI), Artificial Intelligence, Language Learning, Marketing and Customer Relations, Religious and Indigenous Studies, and more. Hosted on the InfoSci
®
platform, these collections feature no DRM, no additional cost for multi-user licensing, no embargo of content, full-text PDF & HTML format, and more.
Learn More
Open Access Book (Free Access) - New Models of Higher Education: Unbundled, Rebundled, Customized, and DIY (ISBN: 9781668438091)
The Walmart Corporation and the Lumina Foundation have provided funding to make the publication, New Models of Higher Education: Unbundled, Rebundled, Customized, and DIY (ISBN: 9781668438091), Fully Open Access, completely removing any paywall between researchers in education and the new models for the future of higher education.
Learn More
Open Access Book (Free Access) - Handbook of Research on the Global View of Open Access and Scholarly Communications (ISBN: 9781799898054)
Through a Collaboration between IGI Global and the University of North Texas, the Handbook of Research on the Global View of Open Access and Scholarly Communications (ISBN: 9781799898054) has been published as Fully Open Access, completely removing any paywall between researchers of any field, and the latest research on the equitable and inclusive nature of Open Access and all of its complications.
Learn More
Books
Books
Open Access Books
OnDemand Book Chapters
Books by Subject
Business, Administration, & Management
Scientific, Technical, & Medical (STM)
Education
Books by Field
Business & Management
Computer Science & Technology
Education
Environment & Agriculture
Government & Law
Library & Information Science
Media & Communications
Medicine & Healthcare
Science & Engineering
Security & Forensics
Social Sciences & Humanities
Journals
Journals
OnDemand Journal Articles
Journals by Subject
Business, Administration, & Management
Scientific, Technical, & Medical (STM)
Education
Journals by Field
Business & Management
Computer Science & Technology
Education
Environment & Agriculture
Government & Law
Library & Information Science
Media & Communications
Medicine & Healthcare
Science & Engineering
Security & Forensics
Social Sciences & Humanities
e-Collections
Open Access
Open Access Publishing
Open Access Journals
Open Access Books
Retrospective Open Access
Open Access Agreements
Publish
with Us
Resources
Librarians
e-Collections
Book Title List
Journal Title List
Video Title List
Library Collection Development Service
Browse Forthcoming Books
Consortia Partnerships
Library and Publisher Collaborations
Product Distributors
Catalogs
Open Access Initiative
Instructors
Course Adoption
Teaching Cases
K-12 Online Learning Collection
Researchers
Browse Books
Browse Journals
Browse Forthcoming Books
Search Open Access Content
OnDemand Downloads
Webinars
Authors and Editors
eEditorial Discovery
®
System
Peer Review Process
Ethics and Malpractice
COPE Membership
Fair Use Policy
Open Access Publishing
FAQ
Distributors
Distributor Resources
Book Distributors
Journal Subscription Agencies
E-Resource Partners
Browse Forthcoming Books
Catalogs
About Us
Newsroom
What is Digital Signature
1.
An encrypted message digest created with a private key to authenticate the sender of a computer file or a message.
Learn more in: Federal Public-Key Infrastructure
2.
Is a method of authenticating
digital
information typically treated as a substitute for a physical
signature
, as it eliminates the need to have a paper version of the document that needs to be signed.
Learn more in: Future Challenges of Marketing Online-to-Offline (O2O)
3.
An electronic
signature
based upon cryptographic methods of origin authentication. Usually it is appended to a message to assure the recipient of the authenticity and integrity of the message.
Learn more in: Mobile Payment
4.
A
digital signature
aims to serve the same purposes as a real-world
signature
. A sound
digital signature
ensures that the sender of the
digital signature
can be authenticated, the sender cannot later repudiate that she of he has sent the signed message, and a receiver cannot forge a
digital signature
(without being detected).
Learn more in: Building Secure and Dependable Online Gaming Applications
5.
An electronic
signature
can be deemed the
digital
equivalent of a handwritten
signature
. Electronic
signature
s can be used to authenticate the identity of the signer of the document and to also confirm the data integrity of the document.
Learn more in: An Overview of Privilege Management Infrastructure (PMI)
6.
A
digital signature
is any procedure of encryption for the purpose of information or transactional safety, which is intended to be equivalent to a hand-written
signature
.
Learn more in: Performance and Accountability in E-Budgeting Projects
7.
A mathematical scheme for ensuring the authenticity of a message. The sender encrypts the message using its private key in order to create a
digital signature
. By doing this, the sender adds his identity to the message since the private key is only owned by that particular sender.
Learn more in: Use of Bitcoin for Internet Trade
8.
An identifier used to authenticate the sender of an electronic message or the signer of an electronic document.
Learn more in: Virtual Private Networks
9.
It is a mathematical scheme for presenting the authenticity of
digital
messages or documents; it uses public and private keys to encrypt and decrypt the data.
Learn more in: Data Confidentiality, Integrity, and Authentication
10.
Cryptographic means to determine the integrity of a
digital
content.
Learn more in: Digital Video Authentication
11.
Also called electronic
signature
, it is used to indicate that the plain text or file that it is attached to an electronic mail is originated by the sender. The process has three parts: Key Generation,
Signature
, and Verification. There are other terms comes in association with
Digital Signature
, such as
Digital
Certificates (DC).
Learn more in: Cryptography for Information Security
12.
A
digital
string calculated from a
digital
document and a cryptographic private key. A
digital signature
is bound to both the document signed (hence document-dependent) and the signing key and is universally verifiable.
Learn more in: Bitcoin for E-Commerce: Principles and Applications
13.
Digital signature
is a type of asymmetric cryptography used to simulate the security properties of a
signature
in
digital
rather than written form.
Digital signature
schemes normally give two algorithms, one for signing which involves the user’s secret or private key, and one for verifying
signature
s which involves the user’s public key. The output of the
signature
process is called the “
digital signature
.”
Learn more in: Trustworthy Networks, Authentication, Privacy, and Security Models
14.
A
digital
code that can be attached to an electronically transmitted message that uniquely identifies the sender.
Learn more in: Authentication and Error Resilience in Images Transmitted through Open Environment
15.
A
digital
code that can be attached to an electronically transmitted message to uniquely identify its contents and the sender.
Learn more in: Teletranslation
16.
A
digital signature
aims to serve as the same purposes as a real-world
signature
. A sound
digital signature
ensures that the sender of the
digital signature
can be authenticated, the sender cannot later repudiate that she has sent the signed message, and a receiver cannot forge a
digital signature
(without being detected).
Learn more in: Cyber Security Protection for Online Gaming Applications
17.
It is a mathematical scheme for presenting the authenticity of
digital
messages or documents, it uses public and private keys to encrypt and decrypt the data.
Learn more in: Blockchain and Its Integration as a Disruptive Technology
18.
A secure mathematical algorithm used to validate the credentials of
digital
documents and coded information associated with pre-approved signer to approve transactions.
Learn more in: Hybrid Artificially Intelligent Multi-Layer Blockchain and Bitcoin Cryptology (AI-MLBBC): Anti-Crime-Theft Smart Wall Defense
19.
A message digest encrypted with a private key, used as an electronic means of authentication.
Learn more in: Authentication
20.
A
digital signature
aims to serve as the same purposes as a real-world
signature
. A sound
digital signature
ensures that the sender of the
digital signature
can be authenticated, the sender cannot later repudiate that she has sent the signed message, and a receiver cannot forge a
digital signature
(without being detected).
Learn more in: Increasing the Trustworthiness of Online Gaming Applications
21.
From the Citizen Card it is possible to make the electronic
signature
through the
Digital
Mobile Key, speeding up the process of signing documents.
Learn more in: Sustainability Design Applied to the Digital Signature of Documents
22.
An extra data appended to the message in order to authenticate the identity of the sender, and to ensure that the original content of the message or document that has been sent is unchanged.
Learn more in: Mobile Agent Authentication and Authorization
23.
Public-key cryptographic scheme that ensures authenticity and integrity of a document, and which also reaches the goal of non-repudiation (i.e. the holder of a private key cannot deny having signed a document if verification with the corresponding public key is successful).
Learn more in: The German Electronic Identity Card: Lessons Learned
24.
Extra data appended to the message in order to authenticate the identity of the sender, and to ensure that the original content of the message or document that has been sent is unchanged.
Learn more in: Mobile Agent Authentication and Authorization in E-Commerce
25.
A scheme for demonstrating the authenticity of a
digital
message.
Learn more in: Privacy-Friendly Management of Electronic Health Records in the eHealth Context
Find more terms and definitions using our
Dictionary Search
.
Digital Signature
appears in:
Handbook of Research on Public Information...
Search inside this book for more research materials.
Recommend to a Librarian
Recommend to a Colleague
Looking for research materials? Search our database for more
Digital Signature
downloadable research papers.
InfoSci-OnDemand
Download Premium Research Papers
Full text search our database of 176,600 titles for
Digital Signature
to find related research papers.
Learn More About Digital Signature in These Related Titles
Handbook of Research on Organizational Cultu...
Business & Management
Copyright 2021. 394 pages.
Organizations are facing major disruptions in tech...
In Stock
$29.50 Individual Chapters
Handbook of Research on the Global Impacts a...
Media & Communications
Copyright 2020. 539 pages.
The world is witnessing a media revolution similar...
In Stock
$29.50 Individual Chapters
Analyzing the Economics of Financial Market...
Business & Management
Copyright 2016. 410 pages.
The prosperity and stability of any economic struc...
In Stock
$29.50 Individual Chapters
A Systemic Perspective to Managing Complexit...
Business & Management
Copyright 2014. 580 pages.
Organizational complexity is an unavoidable aspect...
In Stock
$29.50 Individual Chapters
Educational, Psychological, and Behavioral C...
Media & Communications
Copyright 2014. 465 pages.
Online communities continue to evolve as more peop...
In Stock
$29.50 Individual Chapters
Servant Leadership: Research and Practice
Business & Management
Copyright 2014. 405 pages.
Leaders represent a necessary part of any organiza...
In Stock
$29.50 Individual Chapters
Integrated Operations in the Oil and Gas Ind...
Business & Management
Copyright 2013. 457 pages.
The predicted “ICT revolution” has gained increasi...
In Stock
$29.50 Individual Chapters
Implementing Information Technology Governan...
Library & Information Science
Copyright 2008. 270 pages.
In many organizations, information technology (IT)...
In Stock
$29.50 Individual Chapters
Electronic Enterprise: Strategy and Architec...
Business & Management
Copyright 2003. 384 pages.
Enterprise evolution (or electronic enterprise) is...
In Stock
$29.50 Individual Chapters
Global Perspective of Information Technology...
Computer Science & IT
Copyright 2002. 334 pages.
Managing information technology (IT) on a global s...
In Stock
$29.50 Individual Chapters