3 min read
E-signatures in elections: The key to preventing voter fraud?
Election season in the US is upon us - and with it, comes the typical questions of how to secure ballots and prevent voter fraud. In the US, UK, and...
3 min read
Election season in the US is upon us - and with it, comes the typical questions of how to secure ballots and prevent voter fraud. In the US, UK, and...
4 min read
Everywhere you turn in the security world, an interesting word keeps popping up: “Blockchain”. Just like the word “cloud”, this concept has taken...
3 min read
AdES stands for Advanced Electronic Signature, which embraces a family of eIDAS-compliant standards for digital signatures including PAdES, CAdES and...
3 min read
Year after year, more stories surface about large scale data loss from e-government systems across the world.
2 min read
This article discusses the importance and usage of documentation for a key management system within an organization.
5 min read
Have you ever heard the kind of sweet and innocent voice saying, “I didn’t eat my brother’s ice cream”, while the kid’s mouth and t-shirt are covered...
4 min read
This article discusses the functions and use of hierarchical layers when establishing a cryptographic key management policy, and how the policy...
2 min read
On June 11, 2016, Whitfield Diffie, a Technical Advisory Board member at Cryptomathic, and Martin E. Hellman, Professor Emeritus of Electrical...
2 min read
Under the eIDAS Regulation (EU) No 910/2014, a qualified certificate for electronic signature refers to “a certificate for electronic signatures,...