TITLE

EASING, EXPANDING USE OF E-SIGNATURES

AUTHOR(S)
Fest, Glen
PUB. DATE
December 2006
SOURCE
Bank Technology News;Dec2006, Vol. 19 Issue 12, p24
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reports that about 150 global companies with multiple banking relationships have been drawn to the Society for Worldwide Interbank Financial Telecommunication (SWIFT) network to interact with their banks in the U.S. The network interaction would utilize the SWIFT's accessibility and PKI-based security standards. The digital signature pilot from Citigroup and IdenTrust could be a turning point to expand the transaction banking business.
ACCESSION #
23803277

 

Related Articles

  • Citi Pitch: Digital Signatures for Treasurers. Bills, Steve // American Banker;11/8/2006, Vol. 171 Issue 215, p10 

    The article looks at how Citigroup Inc. is hoping to create a business out of offering corporate treasurers digital credentials. The credentials, often called digital signatures, let people use encrypted data to verify their identities, which has become more important as online fraud has become...

  • E-Signatures, Beyond Concept. Bills, Steve // American Banker;8/11/2004, Vol. 169 Issue 154, p1 

    Offers a look at the use of digital signature technology at banks in the United States as of August 2004. Reference to the Electronic Signatures in Global and National Commerce Act; Reluctance of bankers to use the technology because of the difficulty of authenticating people who sign documents...

  • Digital Signature Tokens Alternative To Passwords.  // Database & Network Journal;Dec2003, Vol. 33 Issue 6, p15 

    Reports on the availability of secure online identification for applications with VASCO digital signature technology.

  • Watermarks and Text Transformations in Visual Document Authentication. Fischer, Igor; Herfet, Thorsten // Journal of Computers;Jul2007, Vol. 2 Issue 5, p44 

    Integrity of digital documents is a very important issue if they are to be legally binding. Common solutions, like digital signatures or message authentication codes, are based on cryptography and require computers or similar hardware to be produced. They can be trusted only as long as the...

  • Using a Raspberry Pi as a Versatile and Inexpensive Display Device. Iglesias, Edward; Schlegel, Arianna // Code4Lib Journal;7/15/2013, Issue 21, p11 

    This article covers the process by which a library took some unused equipment and added a cheap computing device to produce very inexpensive but effective electronic signage. Hardware and software issues as well as a step-by-step guide through the process are included.

  • Online Hand Signature Verification: A Review. Sayeed, S.; Samraj, A.; Besar, R.; Hossen, J. // Journal of Applied Sciences;2010, Vol. 10 Issue 15, p1632 

    In conjunction with the recent and amazing development of the Internet, online signature verification is being considered with inventive significance. Not only is online signature verification the least controversial of current biometric methods on the market, it is also one of the most...

  • A Secured Message Transaction Approach by Dynamic Hill Cipher Generation and Digest Concatenation. Chowdhury, Md. Saiful Islam; Shohag, Shoyeb Al Mamun; Sahid, Md. Hasan // International Journal of Computer Applications;Jun2011, Vol. 23, p25 

    An electronic transaction system is a set of participants and their interactions towards an efficient and secured exchange of message between the participants. A secured electronic message transaction system has been designed, developed and implemented where Hill Cipher Cryptosystem is used as...

  • Electronic Signature, Attestation, and Authorship (Updated).  // Journal of AHIMA;2009, Vol. 80 Issue 11, p62 

    The article presents the updated practice brief on the attestation, authorship, and electronic signature. It render insights on the technology used in the related health information technology (IT) standards, e-signatures, and regulatory environment. It notes the electronic health record (EHR)...

  • A Novel Identity Authentication and Key Agreement Scheme for Ad Hoc Network Security. Pi Jian-yong; Liu Xin-song; Wu Ai; Fu Qing-yun // International MultiConference of Engineers & Computer Scientists;2006, p436 

    In this paper, we propose a novel identity authentication and key agreement scheme for ad hoc network security. In this scheme, we present a new digital signature algorithm for identity authentication, the identity authentication is validated by zero-knowledge proof. Because of the fully...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics