2021
DOI: 10.1080/13600869.2021.2004760
|View full text |Cite
|
Sign up to set email alerts
|

The trusted third party or digital notary in Spain: effect on virtual transactions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 29 publications
0
2
0
Order By: Relevance
“…Hackers have specialized knowledge about attacking these devices to access their data or industrial control systems. There are countless sensors and IoT computing devices that are connected to a large part of the global infrastructure (López Jiménez, Dittmar & Vargas Portillo, 2022b). Most of these devices were designed before hackers and electronic intrusions entered our consciousness.…”
Section: New Coordinates Regarding the Internet Of Thingsmentioning
confidence: 99%
“…Hackers have specialized knowledge about attacking these devices to access their data or industrial control systems. There are countless sensors and IoT computing devices that are connected to a large part of the global infrastructure (López Jiménez, Dittmar & Vargas Portillo, 2022b). Most of these devices were designed before hackers and electronic intrusions entered our consciousness.…”
Section: New Coordinates Regarding the Internet Of Thingsmentioning
confidence: 99%
“…Digital image watermarking, namely blind watermarking, is a technique in information security that can integrate initial data with critical information, such as data integrity, ownership, and source. Unlike an apparent stamp or sig-nature, digital watermarking utilizes randomness and redundancy in the content of files and ensures each file copy is uniquely and indissolubly marked with authentication and authorization information [3]. The work is also called steganography.…”
Section: Introductionmentioning
confidence: 99%