Academic literature on the topic 'Digital signatures (Islamic law)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Digital signatures (Islamic law).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Digital signatures (Islamic law)"

1

Rabb, Intisar A., and Sharon Tai. "Digital Islamic Law: Purpose and Prospects." International Journal of Middle East Studies 50, no. 1 (January 31, 2018): 113–18. http://dx.doi.org/10.1017/s0020743817000988.

Full text
Abstract:
“Information wants to be free.” Although this sentiment dominates the current digital landscape, information about Islamic law and history often remains bound to its physical form and to the price of acquiring it. One should not have to travel to several countries or be associated with the handful of institutions with large collections in these fields to gain access to these sources (which can still be onerous once there). But this is precisely the case for those who aim to do serious, comparative, or otherwise broad-ranging work in Islamic law. For Islamic law, there is a persistent problem of access and ease of use.
APA, Harvard, Vancouver, ISO, and other styles
2

Meyer, Helen. "Digital signatures: how they work." Computers & Security 15, no. 3 (January 1996): 223. http://dx.doi.org/10.1016/s0167-4048(96)90304-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Meyer, Helen. "Digital signatures shouldn't enter the encryption debate." Computers & Security 17, no. 1 (January 1998): 57. http://dx.doi.org/10.1016/s0167-4048(97)80252-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hancock, Bill. "Information society in the EU: Digital signatures." Computers & Security 18, no. 4 (January 1999): 292–93. http://dx.doi.org/10.1016/s0167-4048(99)90712-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fageh, Achmad. "Digital Currency under the Perspective of Islamic Law." Maliyah : Jurnal Hukum Bisnis Islam 11, no. 1 (June 29, 2021): 110–28. http://dx.doi.org/10.15642/maliyah.2021.11.1.110-128.

Full text
Abstract:
Fatwa Number: 28/DSn-MUI/III/2002 regulates the sale and purchase of money in the fatwa which reads: Currency buying and selling transactions are basically allowed, provided that: Not for chancy (speculation), just in case (savings), the transaction needs if the currency transactions are of the same type, they must be of the same value and cash. If different types, it must be based on the exchange rate at the time of transaction and cash delivery. The concept of digital currency for buying and selling transactions has met the requirements and pillars. However, in the mechanism, there is an element of ambiguity. Its nature and form is unknown (jahalah), which is contained in the software. The use of digital money is also seen as having many disadvantages. The reason is that when the price goes up, this digital money will be sold, and even the price can go up to zero. Here there is a dark side that is to draw fate and make a profit. So to avoid harm, this digital money is not recommended to be used.
APA, Harvard, Vancouver, ISO, and other styles
6

M. Usman, Uju Suji'ah, and Muh. Nashirudin. "CRYPTOCURRENCY IN ISLAMIC LAW." Jurnal Multidisipliner Bharasa 1, no. 1 (February 18, 2022): 45–56. http://dx.doi.org/10.56691/jurnalmultidisiplinerbharasa.v1i1.6.

Full text
Abstract:
Virtual money is a product of specific cryptocurrency algorithms, where no particular institution or authority controls the circulation of this digital money or underlying assets for which there is no basis for pricing and consumer protection. By ceding the money system into the market, Cryptocurrencies require legality considerations. This research aims to explain cryptocurrency as a means of payment from the perspective of Islamic Law. This research uses a literature review or normative approach. The results showed that a Legal Vacuum or the empty laws governing Cryptocurrencies could potentially negatively impact. This is because there is the principle of haram li ghairihi, where something contains an element of uncertainty. In the Indonesian Ulema Council (MUI) perspective through Fatwa No. 116/DSN/-MUI/IX/2017, cryptocurrency is included in the concept of sharia maqashid due to uncertainty of containing element maysir (gambling).
APA, Harvard, Vancouver, ISO, and other styles
7

Lange, Christian, Maksim Abdul Latif, Yusuf Çelik, A. Melle Lyklema, Dafne E. van Kuppevelt, and Janneke van der Zwaan. "Text Mining Islamic Law." Islamic Law and Society 28, no. 3 (July 20, 2021): 234–81. http://dx.doi.org/10.1163/15685195-bja10009.

Full text
Abstract:
Abstract Digital humanities has a venerable pedigree, stretching back to the middle of the twentieth century, but despite noteworthy pioneering contributions it has not become a mainstream practice in Islamic Studies. This essay applies humanities computing to the study of Islamic law. We analyze a representative corpus of works of Islamic substantive law (furūʿ al-fiqh) from the beginnings of Islamic legal jurisprudence to the early modern period (2nd/8th-13th/19th c.) using several computational tools and methods: text-reuse network analysis based on plain-text annotations and html tags, clustered frequency-based analysis, word clouds, and topic modeling. Applying machine-guided distant reading to Islamic legal texts over the longue-dureé, we study (1) the role of the Qurʾān, (2) patterns of normative qualifications (aḥkām), and (3) the distribution of topics in our corpus. In certain instances the analysis confirms claims made in the scholarly literature on Islamic law, in other instances it corrects such claims.
APA, Harvard, Vancouver, ISO, and other styles
8

Rosyadi, Muhammad Arief Ridha. "Edukasi Hukum Keluarga Islam Berbasis Digital Melalui Instagram pada Akun @Familylawnesia." As-Syar'i: Jurnal Bimbingan & Konseling Keluarga 5, no. 2 (January 7, 2023): 502–18. http://dx.doi.org/10.47467/as.v5i2.2729.

Full text
Abstract:
This article examines Islamic Family Law education on the Instagram social media space on the @familylawnesia account initiated by Rahmatullah since February 2021. Currently, this account is the most popular Islamic Family Law education account on Instagram. This research is qualitative with library research and then analyzed using qualitative descriptive methods and content analysis based on data from the @familylawnesia account and several sources of documentation related to Islamic education. This data was analyzed based on literature relevant to this research topic. The results of this study indicate that digital-based Islamic family law education on the Instagram account @familylawnesia is carried out by displaying content about Islamic family law that is not limited to conceptual theoretical Islamic family law, but rather dynamic discussion, up to date material and objects of study in issues of Islamic family law from classical to contemporary (present). Thus, making the @familylawnesia account education communication approach more adaptable and felt appropriate in responding to the era of disruption with the industrial revolution 4.0 and the generations that participated in its development. Keywords: Islamic Family Law, Instagram, Disruption and Industrial Revolution
APA, Harvard, Vancouver, ISO, and other styles
9

Muhammadi, Fauzan, Deslaely Putranti, Chrisna Bagus Edhita Praja, and Alda Kartika Yudha. "Meta-Mortgaging: Islamic Law Review on Marhūn Issues." Jurnal Media Hukum 29, no. 2 (December 28, 2022): 131–45. http://dx.doi.org/10.18196/jmh.v29i2.16959.

Full text
Abstract:
To this date, technology has seen massive development and, it influences the economic field. The emergence of the metaverse has become an inevitable part of this progress. It serves as a digital world, wherein everyone is able carry out a vast array of activities, including economic transactions. The emergence of digital assets, that has encouraged serious discussion, is inseparable from Islamic law. One of these digital assets is the Non-Fungible Token (NFT). This digital asset is the focus of this study, specifically on for its posibility to become material guarantees. This article employs a qualitative study and presented descriptively through the perspective of Islamic law. The result of this study is that the pledged-object (marhūn) has certain primary conditions for it to be functional, namely: it is a property, it has value, it can be traded, its asset value is clearly known, and it is actually owned by the guarantor (rāhin). The concept of marhūn as a valuable object ultimately answers that NFT is included in the marhūn category. However, since NFTs do not stand alone if the transaction currency used in the metaverse is cryptocurrencies, al-rahn transactions using NFTs become less favourable considering Cyrptocurrency is deemed to be haram.
APA, Harvard, Vancouver, ISO, and other styles
10

Lekkas, Dimitris, and Dimitris Gritzalis. "Cumulative notarization for long-term preservation of digital signatures." Computers & Security 23, no. 5 (July 2004): 413–24. http://dx.doi.org/10.1016/j.cose.2004.03.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Digital signatures (Islamic law)"

1

Menke, Fabiano. "Die elektronische Signatur im deutschen und brasilianischen Recht : eine rechtsvergleichende Studie /." Baden-Baden : Nomos, 2009. http://d-nb.info/996210776/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bösing, Sebastian. "Authentifizierung und Autorisierung im elektronischen Rechtsverkehr : qualifizierte Signaturschlüssel- und Attributszertifikate als gesetzliche Instrumente digitaler Identität /." Baden-Baden : Nomos Verl.-Ges, 2005. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=014171196&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Alfaize, Najah Abdulaziz. "The impact of culture and religion on digital forensics : the study of the role of digital evidence in the legal process in Saudi Arabia." Thesis, De Montfort University, 2015. http://hdl.handle.net/2086/13124.

Full text
Abstract:
This work contributes to the multi-disciplinary community of researchers in computer science, information technology and computer forensics working together with legal enforcement professionals involved in digital forensic investigations. It is focused on the relationship between scientific approaches underpinning digital forensics and the Islamic law underpinning legal enforcement. Saudi Arabia (KSA) is studied as an example of an Islamic country that has adopted international guidelines, such as ACPO, in its legal enforcement procedures. The relationship between Islamic law and scientific ACPO guidelines is examined in detail through the practices of digital forensic practitioners in the process of discovery, preparation and presentation of digital evidence for use in Islamic courts in KSA. In this context, the influence of religion and culture on the role and status of digital evidence throughout the entire legal process has been the main focus of this research. Similar studies in the literature confirm that culture and religion are significant factors in the relationship between law, legal enforcement procedure and digital evidence. Islamic societies, however, have not been extensively studied from this perspective, and this study aims to address issues that arise at both professional and personal levels. Therefore the research questions that this study aims to answer are: in what way and to what extent Islamic religion and Saudi culture affect the status of digital evidence in the KSA legal process and what principles the practitioners have to observe in the way they treat digital evidence in judicial proceedings. The methodology is based on a mixed-method approach where the pilot questionnaire identified legal professionals who come into contact with digital evidence, their educational and professional profiles. Qualitative methods included case studies, interviews and documentary evidence to discover how their beliefs and attitudes influence their trust in digital evidence. The findings show that a KSA judge would trust witnesses more than digital evidence, due to the influence of tradition, which regards justice and law to arise from the relationship between Man and God. Digital evidence, as it arises from the scientific method, is acceptable, but there is underlying lack of trust in its authenticity, reliability and credibility. In the eyes of the legal enforcement professionals working in all areas of the KSA legal process, acceptance of digital evidence in the KSA judicial system can best be improved if knowledge, education and skills of digital forensics specialists is improved also, so that they can be trusted as expert witnesses. This further shows the significance of KSA laws, regulations and education of digital forensic experts as the primary means for establishing trust in digital evidence. Further research following from this study will be focused on comparative studies of other Islamic non-Islamic legal systems as they adopt and adapt western guidelines such as ACPO to their religion, culture and legal systems.
APA, Harvard, Vancouver, ISO, and other styles
4

Hargreaves, C. J. "Assessing the Reliability of Digital Evidence from Live Investigations Involving Encryption." Thesis, Department of Informatics and Sensors, 2009. http://hdl.handle.net/1826/4007.

Full text
Abstract:
The traditional approach to a digital investigation when a computer system is encountered in a running state is to remove the power, image the machine using a write blocker and then analyse the acquired image. This has the advantage of preserving the contents of the computer’s hard disk at that point in time. However, the disadvantage of this approach is that the preservation of the disk is at the expense of volatile data such as that stored in memory, which does not remain once the power is disconnected. There are an increasing number of situations where this traditional approach of ‘pulling the plug’ is not ideal since volatile data is relevant to the investigation; one of these situations is when the machine under investigation is using encryption. If encrypted data is encountered on a live machine, a live investigation can be performed to preserve this evidence in a form that can be later analysed. However, there are a number of difficulties with using evidence obtained from live investigations that may cause the reliability of such evidence to be questioned. This research investigates whether digital evidence obtained from live investigations involving encryption can be considered to be reliable. To determine this, a means of assessing reliability is established, which involves evaluating digital evidence against a set of criteria; evidence should be authentic, accurate and complete. This research considers how traditional digital investigations satisfy these requirements and then determines the extent to which evidence from live investigations involving encryption can satisfy the same criteria. This research concludes that it is possible for live digital evidence to be considered to be reliable, but that reliability of digital evidence ultimately depends on the specific investigation and the importance of the decision being made. However, the research provides structured criteria that allow the reliability of digital evidence to be assessed, demonstrates the use of these criteria in the context of live digital investigations involving encryption, and shows the extent to which each can currently be met.
APA, Harvard, Vancouver, ISO, and other styles
5

Hargreaves, Christopher James. "Assessing the reliability of digital evidence from live investigations involving encryption." Thesis, Cranfield University, 2009. http://dspace.lib.cranfield.ac.uk/handle/1826/4007.

Full text
Abstract:
The traditional approach to a digital investigation when a computer system is encountered in a running state is to remove the power, image the machine using a write blocker and then analyse the acquired image. This has the advantage of preserving the contents of the computer’s hard disk at that point in time. However, the disadvantage of this approach is that the preservation of the disk is at the expense of volatile data such as that stored in memory, which does not remain once the power is disconnected. There are an increasing number of situations where this traditional approach of ‘pulling the plug’ is not ideal since volatile data is relevant to the investigation; one of these situations is when the machine under investigation is using encryption. If encrypted data is encountered on a live machine, a live investigation can be performed to preserve this evidence in a form that can be later analysed. However, there are a number of difficulties with using evidence obtained from live investigations that may cause the reliability of such evidence to be questioned. This research investigates whether digital evidence obtained from live investigations involving encryption can be considered to be reliable. To determine this, a means of assessing reliability is established, which involves evaluating digital evidence against a set of criteria; evidence should be authentic, accurate and complete. This research considers how traditional digital investigations satisfy these requirements and then determines the extent to which evidence from live investigations involving encryption can satisfy the same criteria. This research concludes that it is possible for live digital evidence to be considered to be reliable, but that reliability of digital evidence ultimately depends on the specific investigation and the importance of the decision being made. However, the research provides structured criteria that allow the reliability of digital evidence to be assessed, demonstrates the use of these criteria in the context of live digital investigations involving encryption, and shows the extent to which each can currently be met.
APA, Harvard, Vancouver, ISO, and other styles
6

Maat, Sandra Mariana. "Cyber crime: a comparative law analysis." Diss., 2004. http://hdl.handle.net/10500/2056.

Full text
Abstract:
The Electronic Communications and Transactions Act, 25 of 2002, eradicated various lacunae that previously existed in respect of cyber crimes. Cyber crimes such as inter alia hacking, rogue code, unauthorised modification of data and denial of service attacks have now been criminalised. Specific criminal provisions in relation to spamming, computer-related fraud and extortion have also been included in the Act. It is argued that theft of incorporeal items such as information has already been recognised in our law, but has not been taken to its logical conclusion in our case law. However, there are instances where neither the common law nor our statutory provisions are applicable and where there is still a need for legislative intervention. The Act sufficiently deals with jurisdiction, the admissibility of data messages, the admissibility of electronic signatures and the regulation of cryptography. Cyber inspectors are a new addition to law enforcement.
Jurisprudence
L. L. M.
APA, Harvard, Vancouver, ISO, and other styles
7

Mtuze, Sizwe Lindelo Snail ka. "A comparative review of legislative reform of electronic contract formation in South Africa." Diss., 2015. http://hdl.handle.net/10500/22724.

Full text
Abstract:
Electronic contracts in the new technological age and electronic commerce have brought about world-wide legal uncertainty. When compared to the traditional paper-based method of writing and signing, the question has arisen whether contracts concluded by electronic means should be recognised as valid and enforceable agreements in terms of the functional equivalence approach. This study will examine the law regulating e-commerce from a South African perspective in contrast to international trends and e-commerce law from the perspective of the United States. The research investigates various aspects of contract formation such as time and place, validity of electronic agreements, electronic signatures, attribution of electronic data messages and signatures, automated transaction as well as select aspects of e-jurisdiction from a South African and United States viewpoint.
Mercantile Law
LLM
APA, Harvard, Vancouver, ISO, and other styles
8

Snail, Sizwe. "A comparative review of legislative reform of electronic contract formation in South Africa." Diss., 2015. http://hdl.handle.net/10500/20161.

Full text
Abstract:
Electronic contracts in the new technological age and electronic commerce have brought about world-wide legal uncertainty. When compared to the traditional paper-based method of writing and signing, the question has arisen whether contracts concluded by electronic means should be recognised as valid and enforceable agreements in terms of the functional equivalence approach. This study will examine the law regulating e-commerce from a South African perspective in contrast to international trends and e-commerce law from the perspective of the United States. The research investigates various aspects of contract formation such as time and place, validity of electronic agreements, electronic signatures, attribution of electronic data messages and signatures, automated transaction as well as select aspects of e-jurisdiction from a South African and United States viewpoint.
Mercantile Law
LLM
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Digital signatures (Islamic law)"

1

Ḥujjīyat al-tawqīʻ al-iliktrūnī fī qānūn al-ithbāt: Fiqhan wa-qaḍāʼan : dirāsah muqāranah. [Khartoum?]: [publisher not identified], 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Stephen, Mason. Electronic signatures in law. London: LexisNexis, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Electronic signatures in law. 2nd ed. Haywards Heath, West Sussex: Tottel Pub., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Commission, European. The legal aspects of digital signatures. Gent]: Mys & Breesch, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Electronic signatures law and regulation. London: Thomson/Sweet & Maxwell, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Electronic signatures in law. 3rd ed. Cambridge: Cambridge University Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

California. Legislature. Assembly. Committee on Information Technology., ed. Securing the Internet: Digital signatures & electronic transactions in California. Sacramento, Calif: The Committee, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Clara, Bibiana Luz. Ley de firma digital comentada. Rosario, Santa Fe, Argentina: Editorial Jurídica, Nova Tesis, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Florida. Legislature. Joint Committee on Information Technology Resources. Electronic signatures: A key to unlocking electronic commerce in Florida. Tallahassee: Florida Legislature, Joint Committee on Information Technology Resources, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Borowicz, Konrad. Ustawa o podpisie elektronicznym: Komentarz. Bielsko-Biała: Park, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Digital signatures (Islamic law)"

1

Winn, Jane Kaufman. "Couriers Without Luggage: Negotiable Instruments and Digital Signatures." In The Creation and Interpretation of Commercial Law, 245–92. London: Routledge, 2022. http://dx.doi.org/10.4324/9781315193939-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fawzi, R., F. F. R. S. Hamdani, I. M. Wijayanti, and L. Dzulhijjah. "Analysis of the compilation of Islamic Law (KHI Article 181): An Islamic law perspective." In Islam, Media and Education in the Digital Era, 403–7. London: Routledge, 2022. http://dx.doi.org/10.1201/9781003219149-59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Maryandi, Y., I. Nurrachmi, and W. A. Wiksana. "The existency of Islamic criminal law against the death penalty for thoughts of drugs." In Islam, Media and Education in the Digital Era, 489–92. London: Routledge, 2022. http://dx.doi.org/10.1201/9781003219149-71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Thaker, Mohamed Asmy Bin Mohd Thas, Ahmad Bin Khaliq, Hassanudin Bin Mohd Thas Thaker, Md Fouad Bin Amin, and Anwar Bin Allah Pitchay. "The Potential Role of Fintech and Digital Currency for Islamic Green Financing: Toward an Integrated Model." In Economics, Law, and Institutions in Asia Pacific, 287–308. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-2662-4_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hakim, Siti Nurina, and Milla Hanifa. "The role of leaders in cultivating Islamic values in companies." In Emerging Trends in Psychology, Law, Communication Studies, Culture, Religion, and Literature in the Global Digital Revolution, 5–8. London ; New York : Routledge, [2020]: Routledge, 2020. http://dx.doi.org/10.1201/9780429322259-02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Van Cuong, Nguyen. "The Emerging Legal Framework for Smart Cities in Vietnam." In Smart Cities in Asia, 79–90. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-1701-1_7.

Full text
Abstract:
AbstractThe idea of the “smart city” is widely understood in Vietnam today. On 1 August 2018, the prime minister issued a decision to approve a national plan for development of smart sustainable cities during 2018–2025, with a vision toward 2030. This decision sets a target to turn the four biggest cities in Vietnam (Hanoi, Ho Chi Minh City, Da Nang, and Can Tho) into cities with core smart functions by 2025 or 2030. However, most of the smart city projects remain at the pilot stage. There are several legal issues to be addressed to help those projects run smoothly. This paper traces the evolution of the legal framework for smart cities in Vietnam in recent years and the driving forces behind this evolution. It shows that the legal framework for smart city projects in Vietnam is still in an early stage of development with room for improvement, especially in the areas of legal rules for information and communication technology (ICT) application (especially digital signatures), urban governance of infrastructure, construction and engineering laws, intellectual property rights, and protection of personal data (data rights law and privacy law).
APA, Harvard, Vancouver, ISO, and other styles
7

Todd, Paul. "Validity of Electronic and Digital Signatures." In E-Commerce Law, 115–39. Routledge-Cavendish, 2017. http://dx.doi.org/10.4324/9781843147343-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Todd, Paul. "Encryption, Electronic and Digital Signatures in Principle." In E-Commerce Law, 103–14. Routledge-Cavendish, 2017. http://dx.doi.org/10.4324/9781843147343-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

"State Laws Concerning Encryption, Key Escrow, and Digital Signatures." In Telecommunications Law in the Internet Age, 483–501. Elsevier, 2002. http://dx.doi.org/10.1016/b978-155860546-6/50042-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

John, Ubena. "E-Documents and E-Signatures in Tanzania." In Digital Democracy, 610–42. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-1740-7.ch031.

Full text
Abstract:
This chapter analyses the use of e-Documents and e-Signatures in Tanzania with a view of establishing their legal status, applicability, and the future of such technologies in e-Government systems. That is important as Information and Communications Technology (ICT) is widely employed in Tanzania. Moreover, the development and application of information systems is influenced by law. Therefore, the problem investigated is twofold: First, legal status, validity, and admissibility of e-Documents and e-Signatures in evidence in Tanzania are questioned. Second, the challenges facing the establishment of e-Government in Tanzania are explored. The chapter is a qualitative study, i.e. library- and desk-based research. Various literatures focusing on e-Documents and e-Signatures are reviewed, analysed, and evaluated so as to draw a conclusion on the relevancy of e-Documents and e-Signatures in the e-Government projects in Tanzania. The literature analysis conducted found that there is a lack of legal framework to recognize e-Documents and e-Signatures compounded with poor ICT infrastructure in Tanzania. This scenario puts e-Government endeavours at risk. It is recommended that the government should enact the laws to recognise e-Documents and e-Signatures to boost e-Commerce as well as e-Government.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Digital signatures (Islamic law)"

1

Hosmer, Chet. "Using SmartCards and digital signatures to preserve electronic evidence." In Enabling Technologies for Law Enforcement and Security, edited by Kathleen Higgins. SPIE, 1999. http://dx.doi.org/10.1117/12.334542.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Varbanova, Gergana. "DIGITAL SIGNATURE ON A TABLET - HANDWRITTEN OR ELECTRONIC SIGNATURE?" In EDUCATION, SCIENCE AND DIGITAL INNOVATIONS 2021. Varna Free University "Chernorizets Hrabar", 2022. http://dx.doi.org/10.36997/esdi2021.86.

Full text
Abstract:
The dynamic processes of digitalization and digital transformation require certain facts from the electronic world to be studied, and concepts such as electronic documents and electronic signatures to be analyzed. Modern technologies offer different solutions for creating and signing electronic documents, and this in turn raises the question of what is the signature on a specialized stylus signing device - is it a handwritten signature or an electronic signature? This report aims to clarify the legal nature of this new phenomenon and to help to better understand it in theory and for the needs of jurisprudence. The informal reason for presenting the report was the hesitation in the case law on how the signature placed on a tablet cut with a special pen (stylus) should be treated.
APA, Harvard, Vancouver, ISO, and other styles
3

Faz-Hernández, Armando, and Julio López. "Speeding up Elliptic Curve Cryptography on the P-384 Curve." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2016. http://dx.doi.org/10.5753/sbseg.2016.19306.

Full text
Abstract:
The P-384 is one of the standardized elliptic curves by ANSI and NIST. This curve provides a 192-bit security level and is used in the computation of digital signatures and key-agreement protocols. Although several publicly-available cryptographic libraries support the P-384 curve, they have a poor performance. In this work, we present software techniques for accelerating cryptographic operations using the P-384 curve; first, we use the latest vector instructions of Intel processors to implement the prime field arithmetic; second, we devise a parallel scheduling of the complete formulas for point addition law. As a result, on Skylake micro-architecture, our software implementation is 15% and 40% faster than the OpenSSL library for computing ECDSA signatures and the ECDH protocol, respectively.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography