Understanding non-repudiation of origin and non-repudiation of emission

This article sheds light on the two approaches to achieve non-repudiation of an electronic message: non-repudiation of emission and non-repudiation of origin.

Read more

E-signatures in elections: The key to preventing voter fraud?

Election season in the US is upon us - and with it, comes the typical questions of how to secure ballots and prevent voter fraud. In the US, UK, and many other countries there are endless numbers of instances demonstrating cases of electoral fraud.

Read more

Centralized Authentication and Signing for E-Government

Achieve Non-Repudiation of Origin (NRO) and Non-Repudiation of Emission (NRE)

Read more

How Digital Signatures and Blockchains Can Work Together

Everywhere you turn in the security world, an interesting word keeps popping up: “Blockchain”. Just like the word “cloud”, this concept has taken hold of the security industry and has become one of the hottest emerging technologies. But what exactly is it?

Read more

Introducing the Signature Activation Protocol for Remote Server Signing

This article explains the Signature Activation Protocol in the context of eIDAS-compliant central signing. It sheds lights on its purposes and outlines its implementation for remote/central signature servers.

Read more

The eIDAS regulation: A new dawn of digital opportunity for banks

This article was originally published in the Banking Automation Bulletin , Issue 352

Read more

Looking at the Future of e-Invoicing in US Government Agencies

Governments and organizations across the globe have begun shifting to electronic invoicing, driven by mandates coming from the European Commission, the US Federal Reserve Bank (of Minneapolis), and many over governing bodies.

Read more

Using The AdES Standard for Mobile and Distributed Environments

AdES stands for Advanced Electronic Signature, which embraces a family of eIDAS-compliant standards for digital signatures including PAdES, CAdES and XAdES. 

Read more

A key component for e-government security: central signing and authentication

Year after year, more stories surface about large scale data loss from e-government systems across the world.

Read more