Wildy logo
(020) 7242 5778

Wildy’s Book News

Book News cover photo

Vol 21 No 9 Sept/Oct 2016

Book of the Month

Cover of Goode on Commercial Law

Goode on Commercial Law

Edited by: Ewan McKendrick
Price: £170.00

Pupillage & Student Offers

Special Discounts for Pupils, Newly Called & Students

Read More ...

Secondhand & Out of Print

Browse Secondhand Online


Electronic Signatures: V. 5. Authentication Technology from a Legal Perspective

Image not available lge

ISBN13: 9789067041744
ISBN: 9067041742
Published: December 2004
Publisher: T.M.C. Asser Press
Format: Hardback
Price: £42.99

Despatched in 7 to 9 days.

The contention that the provision of European Directives on functional legal requirements for digital signature validity solves a core problem of electronic commerce can at best be called naive. In this book it is made clear that there are no simple shortcuts for the lawyer who is concerned with authenticated digital transactions. Schellekens describes the main aspects of authentication technologies, presenting the technical insights needed to get to the legal semantics of functional equivalence between traditional and digital signatures. He focuses on the usability of authentication technology and what it entails for its users. The research for this book is based on an in-depth literature study and interviews with highly qualified experts in the field. It provides valuable tools and background information not only for everyone active in or setting out on e-business in its widest concept, but also for practising lawyers and students of information technology.

Image not available lge
Information Technology Law
Abbreviations; 1. Introduction; 1.1 Introduction; 1.2 Defining the problem; 1.3 Outline; 2. Authentication technology: an elementary explanation; 2.1 Introduction; 2.2 Authentication within the internet; 2.3 Dedicated means of authentication; 2.4 Public key encryption; 3. Usability of authentication technology; 3.1 Introduction; 3.2 Qualification as a signature; 3.3 Evidentiary value; 3.4 Semi-legal considerations of usability; 4. Misuse and the burden of proof; 4.1 Introduction; 4.2 The division of risks; 4.3 The division of the burden of proof; 5. Privacy implications of the use of electronic signatures; 5.1 Why privacy?; 5.2 Digital signatures; 5.3 Symmetric encryption; 5.4 Biometrics: the dynamic signature or signature-scan; 5.5 Conclusion; 6. Conclusion; Literature; Appendix; Index.