Wildy logo
(020) 7242 5778

Wildy’s Book News

Book News cover photo

Vol 23 No 5 May/June 2018

Book of the Month

Cover of Drafting Commercial Agreements

Drafting Commercial Agreements

Price: £110.00

Offers for Newly Called Barristers & Students

Special Discounts for Newly Called & Students

Read More ...

Secondhand & Out of Print

Browse Secondhand Online


Lowe legislation jp
Sealy millman 2018 jp
Desmith out now
Luba housing

Electronic Signatures: V. 5. Authentication Technology from a Legal Perspective

ISBN13: 9789067041744
ISBN: 9067041742
Published: December 2004
Publisher: T.M.C. Asser Press
Format: Hardback
Price: £42.99

Despatched in 7 to 9 days.

The contention that the provision of European Directives on functional legal requirements for digital signature validity solves a core problem of electronic commerce can at best be called naive. In this book it is made clear that there are no simple shortcuts for the lawyer who is concerned with authenticated digital transactions. Schellekens describes the main aspects of authentication technologies, presenting the technical insights needed to get to the legal semantics of functional equivalence between traditional and digital signatures. He focuses on the usability of authentication technology and what it entails for its users. The research for this book is based on an in-depth literature study and interviews with highly qualified experts in the field. It provides valuable tools and background information not only for everyone active in or setting out on e-business in its widest concept, but also for practising lawyers and students of information technology.

Information Technology Law
Abbreviations; 1. Introduction; 1.1 Introduction; 1.2 Defining the problem; 1.3 Outline; 2. Authentication technology: an elementary explanation; 2.1 Introduction; 2.2 Authentication within the internet; 2.3 Dedicated means of authentication; 2.4 Public key encryption; 3. Usability of authentication technology; 3.1 Introduction; 3.2 Qualification as a signature; 3.3 Evidentiary value; 3.4 Semi-legal considerations of usability; 4. Misuse and the burden of proof; 4.1 Introduction; 4.2 The division of risks; 4.3 The division of the burden of proof; 5. Privacy implications of the use of electronic signatures; 5.1 Why privacy?; 5.2 Digital signatures; 5.3 Symmetric encryption; 5.4 Biometrics: the dynamic signature or signature-scan; 5.5 Conclusion; 6. Conclusion; Literature; Appendix; Index.