Show simple item record

dc.contributor.authorSchwartz, Ladislav
dc.contributor.authorTrstenský, Dušan
dc.contributor.authorSádovský, Jaroslav
dc.date.accessioned2011-01-19T12:00:28Z
dc.date.available2011-01-19T12:00:28Z
dc.date.issued2004
dc.identifier.citationAdvances in electrical and electronic engineering. 2004, vol. 3, no. 3, p. 48-51.
dc.identifier.issn1336-1376
dc.identifier.urihttp://hdl.handle.net/10084/83667
dc.format.extent117460 bytescs
dc.format.mimetypeapplication/pdfcs
dc.language.isosken
dc.publisherŽilinská univerzita v Žiline. Elektrotechnická fakulta
dc.relation.ispartofseriesAdvances in electrical and electronic engineeringen
dc.relation.urihttp://advances.utc.sk/index.php/AEEEen
dc.rightsCreative Commons Attribution 3.0 Unported (CC BY 3.0)en
dc.rights© Žilinská univerzita v Žiline. Elektrotechnická fakultaen
dc.rights.urihttp://creativecommons.org/licenses/by/3.0/en
dc.titleTechnológia elektronického podpisuen
dc.title.alternativeTechnology of electronic signatureen
dc.typearticleen
dc.description.abstract-enAn electronic signature uses a hash of message and an asymetrical algorithm of encryption for its generation. During verification of message on receiver side the hash of original message must be identical with the hash of received message. Electronic message is secured autentization of author and integrity of transmission date. By electronic signature it is possible to sign everything what is in digital form.en
dc.rights.accessopenAccesscs
dc.type.versionpublishedVersioncs
dc.type.statusPeer-reviewedcs


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

Creative Commons Attribution 3.0 Unported (CC BY 3.0)
Except where otherwise noted, this item's license is described as Creative Commons Attribution 3.0 Unported (CC BY 3.0)