Digital Signature Services

Known as: DSS 
Digital Signature Services (DSS) is an OASIS standard. The Digital Signature Services (DSS) specifications describe two XML-based request/response… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1995-2017
01219952017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Embedded systems supported on FPGAs are increasingly playing a bigger role on safety-critical areas. A particular example of a… (More)
  • figure 1
  • table I
  • figure 3
  • figure 2
  • figure 4
Is this relevant?
2013
2013
Keyless Signatures Infrastructure (KSI) is a globally distributed system for providing timestamping and server-supported digital… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2012
2012
This paper present the realistic flaws and design implementation of security mechanisms in current e-mail services for… (More)
  • figure 1.1
  • table 1
  • figure 1.2
  • figure 1.3
  • figure 1.4
Is this relevant?
2006
2006
Implementing digital signatures on an individual basis presents many challenges, particularly with regard to key management and… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2006
2006
This paper presents two related activities, the first is the OASIS Digital Signature Services (DSS) standard, the second is the… (More)
  • figure 7
  • figure 8
  • figure 10
  • figure 11
  • table 1
Is this relevant?
2005
2005
The technique of electronic time-stamping allows a client to get an electronic proof of the existence of a document at a specific… (More)
  • figure 1
Is this relevant?
2004
2004
The proliferation and convergence of wireless communications, location technologies, information systems, the Internet, and… (More)
  • figure 1
  • figure 2
Is this relevant?
1995
1995
Traditionally encryption has been used between institutions rather than between individuals. Perhaps the need to preserve the… (More)
  • figure 1
  • figure 2
Is this relevant?
1995
1995
The Kerberos authentication system is based on the trusted 3rd party Needham-Schroeder authentication protocol. The system is one… (More)
  • figure 1
Is this relevant?