Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2021
![]() |
10.5120/ijca2021921567 |
Hellen N Kabira and Robert O Oboko. A Public Key Infrastructure Model for Verification of Court Documents: The Judiciary of Kenya. International Journal of Computer Applications 183(20):46-50, August 2021. BibTeX
@article{10.5120/ijca2021921567, author = {Hellen N. Kabira and Robert O. Oboko}, title = {A Public Key Infrastructure Model for Verification of Court Documents: The Judiciary of Kenya}, journal = {International Journal of Computer Applications}, issue_date = {August 2021}, volume = {183}, number = {20}, month = {Aug}, year = {2021}, issn = {0975-8887}, pages = {46-50}, numpages = {5}, url = {http://www.ijcaonline.org/archives/volume183/number20/32044-2021921567}, doi = {10.5120/ijca2021921567}, publisher = {Foundation of Computer Science (FCS), NY, USA}, address = {New York, USA} }
Abstract
The objective of this paper is to review the system developed that incorporates Public Key Infrastructure technology and in particular the use of digital signatures to enable the verification of documents generated in the Judiciary of Kenya. It reviews the existing technical threats on information creation and transmission and addresses the measures implemented to mitigate these.
References
- S. Benabdallah, S. Guemara El Fatmi, N. Boudriga, 2002.“Security issues in e-government models: what governments should do?” Conference Paper · February 2002 DOI: 10.1109/ICSMC.2002.1173445 · Source: IEEE Xplore
- Rasim Alguliyev, Farhad Yusifov, Department of Information Society Problems Institute of Information Technology of ANAS Baku, Azerbaijan, 2015. “Challenges in E-government: Conceptual Approaches and Views”.
- Tri Kuntoro Priyambodo, 2017. “A Comprehensive Review of e-Government Security” Asian Journal of Information Technology January 2017 DOI: 10.3923/ajit.2017.282.286
Keywords
Document Security, Court documents