CFP last date
22 July 2024
Call for Paper
August Edition
IJCA solicits high quality original research papers for the upcoming August edition of the journal. The last date of research paper submission is 22 July 2024

Submit your paper
Know more
Reseach Article

A Public Key Infrastructure Model for Verification of Court Documents: The Judiciary of Kenya

by Hellen N. Kabira, Robert O. Oboko
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 20
Year of Publication: 2021
Authors: Hellen N. Kabira, Robert O. Oboko
10.5120/ijca2021921567

Hellen N. Kabira, Robert O. Oboko . A Public Key Infrastructure Model for Verification of Court Documents: The Judiciary of Kenya. International Journal of Computer Applications. 183, 20 ( Aug 2021), 46-50. DOI=10.5120/ijca2021921567

@article{ 10.5120/ijca2021921567,
author = { Hellen N. Kabira, Robert O. Oboko },
title = { A Public Key Infrastructure Model for Verification of Court Documents: The Judiciary of Kenya },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2021 },
volume = { 183 },
number = { 20 },
month = { Aug },
year = { 2021 },
issn = { 0975-8887 },
pages = { 46-50 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume183/number20/32044-2021921567/ },
doi = { 10.5120/ijca2021921567 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:17:22.291054+05:30
%A Hellen N. Kabira
%A Robert O. Oboko
%T A Public Key Infrastructure Model for Verification of Court Documents: The Judiciary of Kenya
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 20
%P 46-50
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The objective of this paper is to review the system developed that incorporates Public Key Infrastructure technology and in particular the use of digital signatures to enable the verification of documents generated in the Judiciary of Kenya. It reviews the existing technical threats on information creation and transmission and addresses the measures implemented to mitigate these.

References
  1. S. Benabdallah, S. Guemara El Fatmi, N. Boudriga, 2002.“Security issues in e-government models: what governments should do?” Conference Paper · February 2002 DOI: 10.1109/ICSMC.2002.1173445 · Source: IEEE Xplore
  2. Rasim Alguliyev, Farhad Yusifov, Department of Information Society Problems Institute of Information Technology of ANAS Baku, Azerbaijan, 2015. “Challenges in E-government: Conceptual Approaches and Views”.
  3. Tri Kuntoro Priyambodo, 2017. “A Comprehensive Review of e-Government Security” Asian Journal of Information Technology January 2017 DOI: 10.3923/ajit.2017.282.286
Index Terms

Computer Science
Information Sciences

Keywords

Document Security Court documents