Map
Index
Random
Help
th

Quote: use timestamps for tamper-unpredictable documents, i.e., when the motivation to illegally modify a document occurs long after the document's creation

topics > all references > references g-h > QuoteRef: harbS2_1991 , p. 109



Topic:
timestamps
Topic:
authentication

Quotation Skeleton

Suppose we can establish that either the necessary … document's creation. … [For example] If all the company's documents were routinely … , then by the time it became apparent … to tamper with them. We call such documents … [One could time-stamp documents in bulk by time-stamping a list of document hash values.] … It is in fact difficult to think of … [of original vs. fake] to photographs, videos, or audio recordings than time-stamping.   Google-1   Google-2

Copyright clearance needed for quotation.

Additional Titles

Quote: timestamps are an effective mechanism to authenticate photographs, videos, and audio recordings

Related Topics up

Topic: timestamps (19 items)
Topic: authentication (87 items)

Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.