Vous êtes sur la page 1sur 141

&' %

./ 0 ! - +) , - * ') &' ( # $% $" !"


'7 2 ) $ 9: 1 , 2 34 54 6 '7 '8(
- +) , 27 = 4 9: 4 . *$ -$ %; < . 2 34
<% 2B. )': @3 A A " 0 ! >4? /
'7 C 7 ? % 6; 4! 2. - : *$
24! -? D 4 &?E 3, >4 -@ 4 2 . *2.
) 6 ?6 + ( 23 ! $4$" FG - /<H
*2. - 'A 4 2 34
*2 3L </ ! 2. I B K' IJ - ' ) A
- : E E( * ') -$ M = % A NO. E D
2 E,' Q' R ' B.' -$ ' PI ; '%
T, A ! *$) A R ' >4 >4 A@ 4 *2. -$) S </ 1 :
$4 T, :W4 "' I B X4 : V 6 '+G U2 G
'. '+G U$33 $ = < 3 A6 F3 < ' > 2 '+G U$33 A +4$ 4
U$3 < T, < < Z . < .'. " 4. T, < 7 - Y.
[O < -' 2. 4 + %; @3 '. >4
4 ? B 23 A 4 S! . A *2. - '
*2. .. FG
?6 3, @ \'E) ! 2 -?
R Z 4 4! 2 *2. ) @"' R Z $) 7 D. $)
%; Q 4/ '@ @/ . . R@ < $ @) $7 4 -'( .- .
'@ ?6 < $ @) . . R@ 24 4$ ['O. 4 V 9 54 6 2
2 .- = D > * D <4 % 4'+;. = 2 B]
- ) > 'Z ' A 4. T, 3 ? % <' IA" </ 2. " ' ? %
$7 4 3 -$A ? % ?6 + ( , 24' 4 . 3) * 'A
*2.
$ I 27 . 4 - Y. 4. T, 3 ? % ^, IA 4
X4 < '3 < 3MA `''3 >4 '@_ F 2)9: '" *$) (PKI) 'A
': $J ! -$) Ja
D 4 ': 27 . 4 >4 * ') 7 3) [ O `''3
*$4 A 54$8 !A F3 X4 : V 6 $3 - Y.
[O 6; ? % . , 27 . 4 >4 4 S! >4 3
'3) IB" 24' @/ H ?6 b . . IA" T,
* : ^Y ?6 2Z .
': $J ! $- < '% 7 D. `''3 >4 D E "'
</ I N (J :- @ S ! 27 . 4 >4 < +A 4 3)/ '%
S'A :/ 1 : 2@" XG' $3G :& >4 % $ *2. ]
*$) < 4 < !4! '% NO. ': : c4
AQ @YJ ' Z/ ) > ' > )' 7 2. S A 7
4' . Z X , 7 > 3MA *$4/ RA % 4$E $ ) 1? Q >4 <$ .
</ ' @ $ ' Q >4 >4 $ IJ \'% '7 $3A) d4 24 A
* : $Z $ - 'A 1?

() *+
, , - .* / 0 1

&
2 3 4 5

.................................................................................... 777777777777777777777777777777777777 . 6

................................................................ (< PKI ; 6 : 8 9 5 1)

77777777777777777777 . 6
, , - =
8; M;4
4!
, , 4
</ 2 A P4 B e 2
2 4!
, , - ( < 4 (>
, , - + >?@ 1
D - 9 C' BA = ( <
- <G H : F 5- 1 > E1
?A
49=f ./
b c4
>A 3 <'A . - :$4 ?A $3 .
(< D ; 6 (PKI) (< I 4A 1
>LM 1 * K > J (< I 4A 1 /+
J'87 'A $I
h g ': $J !
': f J
-$33 A V 6
h g ': 2. . $3.
h g ': 4 " RAB ' . $3.
':
h g -$)R6 ': 2
S 2Q ,
>'

......................................................... D O , , > N 895 2)

77777777777777777777 . 6
P4@ Q , , >
, , > <
* , , > > 8,
, , > > O
Client Authentication Certificate 2-5-1)
E-mail Protection Certificate
Server Authentication Certificate
Code Signing Certificate 2-5-4)
Time Stamp Signing Certificate 2-5-5)
IPSec Certificate 2-5-6)
, , > - R .A Q 41 1
, , IC >L R , , > > > = O 1 >. (
(Identity Management)
(Identity Management) %$ "#$ !
+ *- %# , # ()!# *("+ !& ' 2-7-3)
()!# *("+2 %+ (!'# " ./01
()!# *("+45)'./01 3
4: 09# 7 ) 89./01 6
()!# *("+ < # + ;'./01
()!# *("+ "#$ ./01 =
? !+ @0 1 ./01 >
IC > ' , , > > = 1 >. (
A =
UK Oil Portal 2-8-2)
HH3G E FB +C!D " + 2-8-3)
"+ =
)"+* + 3 =
&/
+! 4 '+ 2-9-1)
, , F
(< (CA) , , > / ?1 + 4 (>

............................. ' (< I 4A 1 2 .@ I 5* N 895 3)

. 6
' , , > S&
, , - .* /
.' 1 , , > /
U =T N < , , > /
<4 % - :j. ! >4 i.' 4 R Z ': K '
h : gS ': $J ! $7 '8( , B

............................................ B - = 9 >. 1 J VN Q 895 4)

!"#X W 9 , , - D V
, , - D VU"XT L 1 + . 1
, , > / > Y 1 + 8 (*
U ; C =T ' (< I 4A 1 D (H Z 3 L %

........................................................................................ [ + [= 4 5
: +4 5

l ............................................................... 8 ; M;4 ek k D $"


o ....................................... < BY34n - :X Y ^, 3 4 ! em k D $"
kq .................................. -' -$) 4 . 3) 6; X 4 ep k D $"
> ( >8 , 4 5

................................................................................. 2 $34 , ek kR )
............................................................ )23 AB :q 3 B em kR )
................................................................... ) ^IO S % I ep kR )
.......................................... . A </ FE (PKI) 'A $ I 27 . 4 er kR )
........................................................ $3 , PKI 4 ! 4 'A es kR )
..................................... hInternet Explorer : F4 A g ': e
..... hInternet Explorer : F4 A g ': Details 2A Z - e
......... $ -$) - 7n f8 A) . ': -$ % ep mR )
................ $ -$) - 7n f8 A) . ': -$ % er mR )
.......................................................(purpose) ': - Y . ' 3 es mR )
........................................................................... ': f J S et mR )
.......................................................................... ': u4 el mR )
.......................................................................... ': u4 eq mR )
.......................................................................... ': u4 eo mR )
.......................................................... h ': - f8 S$ g j 3) ': ekv mR )
..................... Certification Path 2A Z j 3) ': w' S H = -$ % ekk mR )
.......... S ': $J ! ': - f8 e
............................................................. h u4 S A g -$) TE3 ': ekp mR )
...................................................................................... -$) D O ': ekr mR )
.................... Mozilla Firefox : $ SSL (YJ w' H eks mR )
............... Internet Explorer 8 : $ SSL (YJ w' H ekt mR )
.................................................................................. SSL ': -$ % ekl mR )
...................................................... ': 3. C'87 3 $% ekq mR )
..................................... $J ^" ': 3. C'87 3 $% eko mR )
....................................................................... ': 7 G emv mR )
.........................................................................................< E 4 '+ emk mR )
............................................ < E +! 4 '+ ' $ I $B emm mR )
....................................................................................... < E 4 '+ emp mR )
........................................................ </ -$ G S = ' ( > B < S$ emr mR )
.......................................................................... S = -$ G < ' < 4 ems mR )
................................................................................... S = X4 T $ emt mR )
.............................................................. </ 3. S = X4 T $ eml mR )
........................................................................ S = X4 + ! T $ emq mR )
............................ A ' (CA) ': $J ! X4 '" 2 A emo mR )
. 6

@" J ?6 8 >4' . 4 < '3


-' ) /2Y+) 24! 7 . <': : $ 'Z - , H 1'; .
F3 S *2. - 'A 4 < :$3) , < :$33 V 8 f S
-$) $4 7 R4'( Y D'6 . @G 2 $4 7 ^4 . . . 6
<$) Z 34! F -@ 4 F4 !, > 4 = 2A Z - '; R(
F4 !, 24 $( V 9 F ? B ' ?6 < ./ ^4 . . .
2. 4 4! %; @3 < :$33 V 8 & ; $Z > , < :$33 ] $B
7 2. $ ^, 3 >4 *2. - 'A )9: 2 f S
4 H - 4E B3J &?E &?E hkool k ': <' 3 I g
m
? *hmvvr F A < ' g $3 B3J &?E % </ ) -$)
-$) R4$ f S ! $ $E B hmvvsg F A
f 3. R ) E 2%: x $. $3 4 4 2J , 2.
,: 'J ^4 . $Z IIA > NO. 1 : * $ '"
D '% 2. F4 !, D >) 4- $ </ f 4!
K ) J7 S$ -$) f b </ - Y. $) B.'
*$ - & ; </ $) 1 : </ < 34 @
A @/ >4 A@ 4 + 4 R ' 2 E,'
>4 A@ < :$3) , 2 E,' IJ ^ ' A ' $3 <% F W= *2.
A 4 >4 *2. <4 % 2 % -$ R
* ') &' ( -' < B, !+ F G ']' 4 <4 %
% . . < 1 :! 2 34 n'Y f4 ] F4 !, 3 A. /
r p
$E n'Y y F4 !, - ? 7 D. '% . . 2 34
B.' 5 h2 34 54 6 - Y . R Zg 4 < <

1
. Clinton and Gore
2
. Millar
3
. Credit Card
4
. Debit Card
A $J @3 '% X /56 2. >4 *$ F4 !, F = F
$4 7 D E. : S 34 'J < F3
4 < R4 A S$ 2I 2. >4 ') [O '. *2. )$ $3G F4 !,
S z$ 34 $4 7 S 4 ' -'E 'J z 4 <4 % @
4! b I '" I4 G U2 G
U$33 A D E . 'J $4 7 < 4 %
Q' R ' B.' ^ ' ' . . $B F W=
5 B.' I ' >4 A@ 4 *2. -$) S 2 E,' B.'
k
kooo D . 2{ *$) A 2. -$) 7 3) Q' 2 E,'
A D ^ kv > *2. - 1 !: -$ ^ ' >4 @
m
A|||| S$ *hmvvp F A 2 ' RE g 2. -$) 1 !: ^ > '. < '3
<$) : <$) &9" 2@" , ') ^ ' 4 < '3
-$) ||||7 3) 34 < :$3) , 8;) ?6 4 </ w' F|||3
*hmvvs p>4 ' } g 2.
. - / 4 NO. ? B <4 % @3 A|||| "
hmvvk r G 24 X g |. V 6 @/ i.' -$) ~ X| 4 < 3 A6 S$ I
*hmvvl s• >Gg $ F4 !, |||| $4 7 R4 A
t
'G G ^Z A 4 ! 4 < '3 (PKI) 'A $ I 27 . 4
>4 *$3 , ': < R6 !A D 3 ^4 ' $ ' 27 .
V 6 $3 - Y. ': $J ! -$) J aD 4 ': 27 . 4
*$4 A 54$8 !A F3 X4 :
- : ': 7 ?6 3, >4 A@ +4 4
< , 3B 2 S'@Y 2. ,: Z . ' , % = ^ '"
4 2 B, ' 3 > A *2. F; $7 Q' f. 3 €4 2@" S
- Y. 2 *2. , 49= 'J 2 €B.' '% fIb
f. 3 . . 2@" S ?@ , ') \?6 ?6 3, 2

1
. CommerceNet
2
. Corbitt
3
. Wang & Emurian
4
. McKnight & Chervany
5
. Chen & Barnes
6
. Public Key Infrastructure
2 % - : 2J , • $7 2 Y [?J $7 ?6
4. T, C 7 2 R . $3 O . . A " PI ; @ B, $34 ,
, 24' 54$8 4 . 3) 3 4 FG 2 .- = 2
'A $ I 27 . 4 *$3 "' ?6 >A4 D ?6 + ( 2. '7
7 = @/ & >4 $ 4 4 '9 FG + A ^,
*2. -$)

i Y !" 'A $ I 27 . 4 A" '6 2. -$) B. )' >4


* : N4 % </
</ 2 A = FE PKI - Y. S ! 2. $E 2E E D R8,
*$3 > 2 4
2 </ 4 'A ! </ K' ': S R8,
* = PI ; '%
7 . >4 : < . '% 'A $ I 27 . 4 f I I. S'. R8,
*$3 ,B
'A $ I 27 . 4 -' i '8 > 'Z S @G R8,
*2. -$) 4 / :
: 8 \\9 5

PKI
0()* +),-. /+ PKI & '% ! " # $

(< PKI ; 6 : 8 9 5

. 6

2 $7 '7 ? B S 2@" - : 2 34 -
3, 1 : *2. -$) R4$ 2 ) 4 S 2@" 'Z .
3, *2. - Z Q‚ 2( % :$ PI ; J 6 ?6
8 Z < '3 2( $4$" S'@Y <$) @" -$4$= - A 8Z 6 ?6
m
>4' 8Z BZ IJ 4 *2. 7. [ O 4 8 Z 4 k>4'
$4 7 $34/ , S 2. hmvvrg p< ' P4 B 5 6 *2.
= *2 34 IA" 4 ) 54 6 ?6 $7 DE 1 ,
r
1 : 2@" 2 34 &?E Q‚ƒ e$4': ' hmvvmg
9:2. . : A8 ?6 $34/ , 4 Q '38 1' €B.' ?6
$7 ^4 ' @" ) X4 4 54 6 2 34 I -' W .
*„2. ) 9: Q Rb % -$33 V 8 , $7 2B3J 8Z
<4 % < . '7 -'( '( 4 f"' </ R ) K'
s
$4$" -$ M = K']' hmvvs G/ j g 2. -$) @/ ) < :$33 >
R4 A F4 !, 2 34 < $B < !, F4 !, / *2. - !, IIA >
*2. 34 $4 7 S < >4
*2. -$) < 4 % @ ) ,- 7 D X4 2 34 54 6
?6 - Y. '7 ' " 2. > A 34 < ) ,- 7 J 7 i ( > 3G
-'E R= X4 R B *$3) " ' „ ||| %A)ƒ X4 <4 % O 4 2@"
t
*$ . Z w X|| X|| 'J . Z i7 &4 2. i …Y
$33 /^A" 8;) ?6 +4 ? B w' ?6 >4 S @/
* : - Y. % C7 @3% = 5 Z :V $ $' $B ?6 >4
?6 D 3 '" S$ C'87 <4 % J'87 4 …Y + •

1
. New Economy
2
. Digital Economy
3
. Turban
4
. Peter Drucker
5
. Qaddus & Achajari
6
. Online
1
0()* +),-. /+ PKI & '% ! " # $

9: Q < 4 % i7 †
$4 7 S . .2 . 6 2. > A @/ 8;)
k
*hmvvt F A X I .g
< 4 % R ) </ : 24 '"' I 4 ! '"
$3G D E . 2 34 < $B < !, F4 !, b I B " < :$3) ,
3 >4 hmvvpg m•I4 , *2. -$% '% 7 < 4 $4 7
:<4 % - :$ A Z2 . 2, e$34':
2 E,' S$ >4 R4 4 ') Y: *2. -$% - / R 'J >4 RA
2 E,' S F= 4 A $ $E B < EE( *2. < 4 % A S$
$3 $4 X) $33 A -$3) , <4 % 4 2.
t s
2. $E B ! hmvvkg : = *hmvvs F A ˆkooo r ‡ " ˆmvvm p>Y"g
*2. A RZ $34 , 4 i7 f 2 E,' $ I
, < ' <$ < ' • <'G 4 :W4 4. T, C 7 2 R
>4 <' IA" </ $ YI ; + S </ @" '
2, 4 8;) ?6 34 -$3) , - Y . '. S$ <' '+G e 'A - ) '
F3 < '> DE <4 " S = <$ <'8 -$) $@B i4 ) 5 O 2 $7 ‰
<'8 D E D ?6 b . . O7 <' '+G U RJ < 3 A6
: >ŠAO S = -$ : '+G U 'A :'I" D E > S = . <' '+G U$
U $ '; S = D . </ -$3 . ,
$ I 27 . 4 * ') - u. = @/ 2. -$) B. R8, >4 2. '. >4
49= 2 A 24' + ( 3 •4 . 4 2. 'G G 'A
< + ^, 2@" f. 3 R - 7 . >A4 ?6 D T,
* . , \', '

1
. Eastlick
2
. Frye & Merrilees
3
. Gefen
4
. Jarvenpaa
5
. Kim
6
. Peter Grabosky
2
0()* +),-. /+ PKI & '% ! " # $

, , - =

, , - 9 C .]C 1
*2. - 4 H D . ps $ - „ ƒ -` S'@Y
: 54 6 'J F3 R@ „ ƒ RJ
m k
hmvvq 4$= 4 g* : EFT EDI <'G 4 3,
p
-'" DE RE . K$ kolv R4
R ) $) RE 3 +4 . < . X4 '8 -'" </ 6 (EFT)

.‹ 0 ! 2 ) < . $( $ *2, :
r
>4 3. <$) 49=< (EDI) - . K$ '
? B b +4 ? B 'J < .
'J 54 6 >4 3. IA" * $=1 :!
t s
$4$" < >4 * S <' $4 7 1 Y. ' , $)
+4 K ' $7 2 B, ) ,- 7 7 .‹
<' . . B. P6 $4$" * B.' f
*$ R % S @. ? B , $7 R iI
$4 7 $ B . P 6 2 34 < koos D .
*$ $) 3)/ 2 $7 : 4 1 '/ , : i7 1 ,
3 2 B, M;4 2. -$) Π; . PI ; ^ 3 k k D $"
e$ < % J?7 '6
, , - 9 C .] C 1 ! !: +
[ 1 ^ 4 *5Z :
U G T
l
4$= 4 (ATM) = '7 > ) K$ kotl D .
< ' < $3A% AI > EE( < . D E . 2 34 '@_ koto D .
mvvr F A
< ' 0 ! 2 ) $( (EFT) -'" DE RE . K$ kolv

1
. Electronic Data Interchange
2
. Electronic Funds Transfer
3
. Electronic Funds Fransfer (EFT)
4
. Electronic Data Interchange (EDI)
5
. Invoices
6
. Purchase orders
7
. Automate Teller Machine
3
0()* +),-. /+ PKI & '% ! " # $

[ 1 ^ 4 *5Z :
U G T
mvvr F A 7 1 : (EDI) - . K$
$7 2 B, ) ,- 7
k
? B <' . .1 : (IOS) .< .
S @.
m
4$= 4 '‡ - Y. z• i.' WWW : <$) )' koov
NeXT
$4 , A% P_' D $, 2 RAB ' . X4 T 4 '@A" •4 mt
kpqv NO. 1 , $4 7 > A < >4 A koop
A) * / IA I ) 4
e$) > B $ - I @G RAB ' . >4 5 6
RZ X4 AB 7 . $4 koor j R Z hk
* : > B $) -$( 4 NO. - Y .
D $, 2 X4 koor ‡. R Z hm
2A Z $4 7 w' ?6 D Z J'87 < :$33 $ '
* ') - = '% NO. IA '6 $3 '8(
') - = R . X4 koos '" R Z hp
*$) ?6 X - Y. D'= D 2 I Z
SA R . X4 kool 4' ` R Z hr
* ') - = '% NO. > A 2IZ
4$= 4 Netscape i.' Mozilla : % koor
Pizza Hut i.' & (YJ ! = 1 Y. 4 <
i7 X > F4 %:
i7 'J I ~ ) R: 4 4 1?
7 Netscape i.' F3 < > SSL +! ,B
koor
4$= 4 & 1 , V$ iE, pj ! P" i.' Amazon.com $- koos
2 34 54 6
Dell 2 ) i.' F3 2 34 - Y. K )
Cisco
r
4$ = i.' e-Bay < '3 34 " > $-
s
4$= 4 S 1 : F4 $ = mvvv

1
. Interorganizational System
2
. World Wide Web browser
3
. Jeff Bezos
4
. Pierre Omidyar
5
. Dot-com
4
0()* +),-. /+ PKI & '% ! " # $

, , - 1/
2B 6 *2. - ' ^, 3 4! - $ $ A % u4
3, $3 , S 4 2J , 2. '( 3, I
^3 f $) 2 . F4 !, ^ 3 R : f. 2J , >4 -?
: B.' ^, 3 >4 * ') B " , < . 4 -'E
^, 3 </ : V 6 X4 *$ 4 F4 !, 3B '6
'6 ^, 3 4 ! hmvvrg F A < ' * D 4 4!
$ - 'A < '3 . B " < :$33 V 8 4 < 4 % - +3 < . : $"
*2. -$ /m k D $"
D * 1_ >L ? , .= , , - [5 1/ X !: +
, , - [5 1/ [ 1_ >L
pts mr . F4 !, ] - ' @ 34! F B.' < .
F4 !, f $4$" D$ . ' hD 4 $B 2 .g - +3
4 w 34! F . . 2 . < :$3) , • 8;
!
' 5 27 = S$ - +3 ?6 % w '@ $
. . F4 !, 4 F4 !, ' @ < 4 % $7 F4 !,
F $34/ , < - . J?7 $4$" ) > ,4 ?6
9b F 49=V OB F4 !, RE RA 34!
X
% $7 . . 2Z A " A 'T < 4<4 %
?6 . . ^Z' R4'( < $7 . . < :$33 V 8
27 = S$ ^ '" 4 " 2 % %
1 ,
"
% . . E, $ :$ $ . >, 6 F4 !, B "
) 8Z 4'" , J 27'. V 8 F F 'A $7
R Z 0 ! @) > +3. X, ) Y3 Q <$) L37 </
" 7 , 8 < $ @) 2Z V ? X , ) F3

1
. Procurement
2
. Ubiquity
3
. Telecommunity
0()* +),-. /+ PKI & '% ! " # $

, , 4

f . F3 6 ?6 % R @ 6 3, ] D
$7 2. </ 2 V $ . . *$ -$) 2 $7 -'( '(
R OB b R OB S 4 S A . mr S PI ; •4 . . .
R ) > 4 = ['O. $ 4 2 $7 *$) 49=< 4 , H" OE
< < ,6 ? B R ) ['O. 24 . 54 6 . K?6
B " 2$ 2 >. ( *$) ?6 3, - Y. 2
D , 4 B.' '% - *2. . K?6 ^4 ?6 .V Y)
NO. $7 >4 @ 54 6 >4 $ + 2J , X4 < '3 2 B.'
- Y. $34 A , '7 < $ @) E I. R 5O $ z % 4 I
4 F4 !, < $ @) $7 4 '@ -? 6 ?6 3,
*$34 A XA 4 D H ) 2 , Y) $ -@

D 4 (> 1 * , , 4
2 *2. 2 IŠ ?6 B " 'E >4 @ 4
) 'J '7 $7 $3 ' 2 2. O4 ) < , S 3B X4
'. $" '6 7 D. >4 *$33 • < $ @) Y S4 SA
c O4 ) > 3G 5E( - '7 $3A)' < A 2. ,: Z 2
>4' 3, XA A" 8Z . . $34/ , $ -$ / $J $-
< $ @) $7 • $/ -' ) 54 6 >4 - [?J ?6 6
H S 2@" b 2 1 : : 2E E *$ ‡
.2. %; Q 4 '@ 4 ! A $34/ ,
< @" '% B 6? IA 'J 2. D . „ 2 ƒ
RZ 4'" , J f"' 2Y+3 4 . 2%: -? 2. <? " D
>4' 3, 4 2J , >4 @ 4 *2. -$) PI ; 2,_ ^ 3 "'
$ .$3@ 3, >4 - Y. < $3 Z F= ?6 6
.2. </ > 7 . '+;. = $/ j . RZ 2 AB
A H "' '3 . '7 4 . '7 ^ '" 2
?6 ^ '" ^A" @/ > .' = $ , 49‡ -$% 2. - @" .3
0()* +),-. /+ PKI & '% ! " # $

*2) $ '7 = @/ ,%=


4'= 2 ) IŠ >4 $ '" 2 - $ P4 B 'J
4 '@ ' 3 6 ?6 3, - Y. - *2. 3, H
2 > 2 < '= ?6 49= 4 E ?6 2 , Y) %; Q
\?6 2 J'87 F; 2 > < $ @) 2 > </ B < .
* ')
$33 $AIZ ' 2 hmvvrg F A < '
?6 4 $7 $ K' >4 $ @_
• < ]E 54 6 >4 '7 $7 - $4 7 (G2C) S 4 (G2B) - +3
-$4 : $ - mvvk . 4 / '4 2 4 skk •4 . D L < '3 *$33
>YI 54 6 ?6 +4 'A RE RA - " i4 ) X , w' ?6
*$ Z< ]E 7 $J

, , 4 1 5 ! ! 8,

>4 - 'A -! h g 9b 3 " $34 , 2


F; E > . >4 * : 24 4$ $4$" 1 .- = F; 2 .
F; Q D 3 X4 D A < A A@ *$4 A 4 6 R= < $ @) J'87
, B.' 8Z . . A" 4 . 3 @ Ž Y . 2@" 2
* .
0()* +),-. /+ PKI & '% ! " # $

, , 4 1/
e 2 2 4! 7
*$3 - Y . 2 34 RJ 4 $' 2 ?6 2 B, 1
* $3 24 4$ $ / >4 $ ' 2 ^ 3 'A 8Z 'A F; 2 A "'
~ A: A" > ‚ $3 R Z 4 F; $7 i7 • 4= V 1
*$ F $3 S I B 2 4 2 ) 34! J 4
* $ '7 F , 'A $7 . 2 , Y) F4 !, 4 5
3 F4 !, '% 2 Z $) 2 +4 1 $ ' 2 , Y)
*$3 , " 7 9: 4 .
' $' 2 2 34 1 : > 8 9)
*$4 A ^4 ' SME IA" J'87 F; > </ $34 A R @

, , - ( < 4 (> 5

'" 4 -$ 24 $( : , < !, 1 : '"


7 . "' ? % </ c4 1 : ') </ 4! A -@^
*2.
2. F= ?6 2 3 > F G ?6
S 2. ?6 D . < 2. ?6 $ ' < ?6 ‡ < R Z
> 3G -' *</ D . ?6 < 1 $; < < +4
2) < IB" 24' - 9 <'MA YI ; R ) '7 $ ' 4 FG
3. ; 3. 'Z b H < ) '7 S , &
< < +4 S IE 24 . 4 < , & H< < +4
*$ <% , i.' 3. ?6
k
- 1 !: -$ ^ ' >4 @ kooo D . 2{
m
2 ' RE g 2. -$) 1 !: ^ > '. < '3 A D ^ kv > *2.
*hmvvp F A

1
. CommerceNet
2
. Corbitt
0()* +),-. /+ PKI & '% ! " # $

-$( 4 IJ ^ - 2. - S mvvk D . 2{ +4 F W=
e $-' B.'
PB] 3 A6 X 4 A w' R4 3 R4 R ) Y. F
+3 , R4 f D$ < $E, ' , 'IB
2 34 > 4 = 2 . ? $ . hPKIg k 'A $ I 27 . 4 R4 <
*hmvvr F A < ' RE g ' Z R4 ? %
-$) 7 3) @ K']' X4 < '3 BO < A
$ I !" X4 < '3 A *hmvvl F A > 3= RE kooq mS @+3 . 3 g 2.
r p
F A kooo F A g 2. -$) 7 3) 4
< : ' mvvv kool F A ‡ " kooo F A >A, koov sR = koot
$3A $Z ! X4 < '3 A hkoosg o hkoor q$IM4 kooo l0 koor t2
kv
*hmvvs F A RE g $3 P4 B O 4 Y 8(3
4 54 6 ?A 4 kk j 4 ' A 2 34 2 3 w' ']' -
km
!, S ' % $) i7 •4 . > 7 $ '38 ]E
ks kr kp
?6 > , : +A 2. 24' 2Z . &; !, S .'. "
'"' - *$ ') - + b 2@" - :/ < 8;)
24' 2Z . 2@" '7 , 4 4 / 34 < 2. </
i7 $ &3" 24 . B" F 54 6 34 ?
pv mvvt D . $3 1 !: • *$ - 'A R4$B '7 i7 $4 7 < $(
:'I" '7 i7 $ $J mr i7 $4 7 4 4 / 34 < $J
4 4 / 34 <' I pm*l 2. -$ / 1 !: > A *$ - 'A $( 24' 2Z .

1
. Public Key Infrastructure (PKI)
2
. Ratnasingham
3
. Ba
4
. Beatty
5
. Czepiel
6
. Morgan & Hunt
7
. Noteberg
8
. Reichheld
9
. Berry
10
. Relationship Marketing
11
. Viruses
12
. Denial-of-service attacks
13
. Spyware
14
. Malware
15
. Phishing
0()* +),-. /+ PKI & '% ! " # $

R 34 < :$3) , $ - 'A PZ' '7 i7 $ 3 + R


R *$ - 2. '7 RJ $/ <' I k*ko 3 +
2Z . .'. " !, S j 4 ) mvvt D . 4 / . . 8Z <4
*hmvvl <'" •g 2. -$) 1 !: <' I q*rp 24'
k
% Y kv 2. -$) S mvvq • ' 34 •4 i.' % W=
l •g Z D 24' < ) 8;) ?6 2 3 > AT $ ) < n Yq
*hmvvq
m
4 4 /< $ < % 2. -$) S mvvq R4 / 24 X3 i.' % W=
*2. ) 9: Q @/ i7 , >4 $3 < + 24' 2Z . ' '3
$J ll *$ - + @_ '7 24' <$) -$4 Y q Y kv F W= >4
2Z . j R $ ) < n $J pt $ ) . . 2 34 < :$3 u. =
*hmvvq R4 / mp •g $33 & 3 " i7 $ $J rq i7 $4 7 24'
< $J sr 2. -$) S J'87 4 + 3 . E E(
4 - g $ - ' < + C'87 >4 mvvs D . % mvvl D . < $J rt
*hmvvq R4 / mk • RE mvvl . J'87
S$ 4 A S$ 3B4 24 $( >4 A@ +A S Z / >4
*$ <% F3 A 2 A = FE 2. < 3 A6
2. : + < 3 A6 S$ A" ? B A I '6
< 3 A6 S$ 8;% @3 i i7 F3 * ') &' ( A@ R
p
! -'E I62J , < D 3 S$ R Z +4 :W4 I $3
* . 83 „ A ƒ „X 4 ƒ 2. :W4 >4 $3)
?6 2 4 < 4 % > 3MA 2 < !A D'= fIb i7 F3
- A) R Z g ?6 h>YI - A) 2 =j /R Z gj 8;)
'% X4 PI ; w E i7 - +) , - ? *$3 4 '7 h
r
*hmvvm "G g$ i7 F3 $( M;4 fIb $ Z +4 '%
@3% = A% $B i7 % '" $4$) 2 Z R
$3 . 2 $7‰D'8( 8;) $ ' A i7 % *2. Y : S =

1
. Harris Interactive
2
. Bankrate
3
. Anonymity
4
* Bhattacherjee

5
0()* +),-. /+ PKI & '% ! " # $

2. ,: % $4 7 $34 , D'6 8;) ?6 34 -$3) , $ A


'‡ ' (YJ '7 1 Y. $B 3 G' > AT @3 % * $ '7 G
• $( > AT > 3G 2. >4 I4 '" *$3 -$ % A < $ '7
i F3 :$ M = < 3 A6 S$ F 4 D % ')
:$ M = F ! < '3 $' 2. Q' X4 A *$) i7
*hkoqo k< 'g $3 RA $3 " ' < 3 A6 S$ , 4 2 BZ' < ,
i ( X4 2. >4 A 2A @ R X4
3 F3 *2. 3. 2 % 8Z F3 < 3 A6 S$ < !
S$ R $' X 4 >4 *$) ) D 4 X 4 $' 2 34
$34/ '" ?6 D - Y. ' 4`''3 27 . 4 '"' < 3 A6
* ') 4 i7 F3 X4 < +4 , i.' $ '
m
S$ e '" < 3 A6 S$ K' hkolo I4 Y I) g ?6 'Š "'
*F3 C 7 < 3 A6 S$ . < 3 A6
2. < +4 E Q 2. B4 Z R ) . < 3 A6 S$
R " 7 < 3 A6 S$ * ') P J' " 7 4 O ( < 3 A6 S$ < '3 $'
p
I4 4 AI4 g ') 4 w' O( R ' :$ M = O( 4'=
V ) 4`''3 O7 ^ 3 " 7 < 3 A6 S$ *hkoos
4 5, ' 4 ') w' `''3 8Z X 4 4 3
*$3 & 3 " R Z F3 X4 +4 V 6 +4 Z
! !, S !, 2;. IA + i7 F3 X4 O7 > 1 =
*$ : Z - Y. ' +! R =R Z - D •4 . 2 3
„ 4 = w Eƒ 4 - DE D 2. > A 3 3 V ) > 3MA
z- +3 „ 4 = w E ƒ *$ ') $4$= . 1 =
X . 4 34 -$3) , . % - Y. ' '‡ . R ) (B2C) %
'6 '7 . 2 3 iE, $ ' h g % *$) F3 :
4D 3 F3 : < +4 +4 .23 $' A $3 D 3 E
. < 3 A6 S$ F 2@" $' 34 -$3) , , 6 *$3

1
. Luhmann
2
. Hirshleifer and Riley
3
. Brielmaier and Diller
1
0()* +),-. /+ PKI & '% ! " # $

24' S! - @ kF / - '4 f8 F3 < / ! 54 6


1 49= M / *hmvvp m' =g $3 S $Z J'87 4 @ 54 6 %; < 3 A6
F3 O. < '3 D -$ % R Z 3 23 ') w'
*2. 3n X 4 % ~ I 2
< +4 A8 2. < 3 A6 S$ ' F3 C 7 < 3 A6 S$
$4/ '" F3 : V 6> ?6 < E ^4 ' ') ) 8Z
, 34 -$3) , % OE F3 C 7 < 3 A6 S$ *hkoos 4g
4 D'8( 2 Y F3 C 7 < 3 A6 S$ @ 83 * ') w' I B -'E
4 * -$3) , 1'7 4 ' + ') 4 & 2. $7
X4 $4 7 A8 BZ' *2. 3. R % fIb 2Y
: S BZ ? B !" ') ,: i(
*hmvvv pR= $ 34 g <$ < - ) A4 'J R Z 2. " R Z b
A hmvvrg & . >Y" F W= 5 6
E > 'Z ' A >4 R @/ *2. 3. A 2A
$3 $ 4 R Z ', i7 $7‰ '8( $ < n > 3MA *$33 n
A. Z $. 4 54 6 3. 3 AT i7 F3
*hmvvr & . >Y"g $ '" ') , -$33 V 8
$7 1 , $4 7 F4 !, 2, : > 3G < ' $) Y: M / K'A
A 4 K']' " A 1 : 2 34 54 6
• "' 2. - $= 2A </ J 3 >4 >4 A@ 4 < '3
7 3) Q' 2 E,' 5 B.' I ' >4 A@ 4 2A Z >4
*$) A 2. -$)
% $33 4 O ( i7 < :$3) , $3 2E E >4
A RZ $34 , i ( X4 4 '3 *$3 < 3 A6 j
g ') ~ 4 . 3) < 4 % A 4 $34 , Q' R ' 2. S
*hmvvs F A

1
. Firewalls
2
. Pavlou
3
. Winand & Pohl
2
0()* +),-. /+ PKI & '% ! " # $

, , - + >?@ 1 1

i. 54 6 $4 7 w : A8 $) n 'O A
F 2@" ? B '"' ! : S '‡
RZ b 4 $ '" i ( >4 3. 2 BOZ S$ NO. <
>4 @ IA" * - A $B X 4 2 34 F3 9 *$)
?6 2 3 i X 4 <' 34 $4 7 $34 , '"' 2 BOZ S$
X4 ! <$% -$ % & -$) 4 2 $7 D'8( 2 Y 8;) 4
* 'A - ) 2 $7‰
PI ; . F3 S '"' X 4 K'
-$) 4 O >4 YI ; $3 E 6 2. ,: Z B O ' <': ': 3
hmvvkg X < ' $3 E 6 hmvvvg k$4 •+ - : $3 E 6 <' IA" 2.
3 h1*| kpqsg $ * - ) `> 3 $ $3 E 6 hmvvpg p
.> > A+
'"' ^ ' 6; X 4 F)'= -'( hmvvpg . > > A+ $3 E 6 < Z
' 9 5E( $3 E 6 : @G -' X Y -'
*2. - 'A $3 . - < % p k D $" 'J

1
. Angus Reid
2
. Turban & Lee
3
. Dongmin & Benbasat
4
. Head & Hassanein
3
0()*+),-. /+ PKI & '% ! " # $

, , - L R L 1 - HC >?@ 1 " ! : +
L N >; > E%
. Q >L R
UXaa"T - = = (& = UXaa"T @R > = UXaa!T D= =.6 H UXaaaT 1 0 & L =
* '% S > 'J ?6 D E • 3 + • /^A" V $ 2. > A -$3) , • ?6 2 3 ' + • 8;) ?6 hkg
*$4 A ] b ?6 2. '7 - +) , • 8;) ?6 4 3 + • * . < @3= ?6
2 , ( f. 3 'J 8;) ?6 • ?6 f. 3 2_ Y S$ • J'87 4 i + •
* '% 8;) ?6 f. 3 2_ Y S$ •
*$) > 54 6 $4 7 • J'87 4 2. > A -$3) , •
$3 "' 3 R4
+ </ , ?6 D E 6 •
*$34 A .
*$) > 4 = D'8( 2 Y • D'8( 'A < S$ • D'8( > 4 = 2 Y • -$ % D'8( •A < '" S$ • h mg
*$) EO3 D'8( 2A Z • RE RA 34! • D'8( 2A Z • X4 ! </ D'8( 2A Z 2 Y
RE RA 34! •
~ A: 34! •
^Z' R4'( '7 $@B - +) , • R4'( < • '+;. = Z 24 .& 2I Z • $4 7 $34 , R A ' + • h pg
*$3 RA D'8( *2 % 2. '7 - +) , R B S$ • % $7
F3 S D $ $. % • 24 .& u. = ?6 2, 4 •
*$) )$ * ') S $3
4> A b 2%: 4 F3 'H • "' 2 ) 24 .& < •
*$) R % : 6 X3 34 4 ')
, -$3) , j A < • * '" ^OZ
*$) > A ^Z ' 7 24 .& . . •
* '% , $@+ AB $7 • *2
<4 % 4 )R @"' - +) , • *$) % $ 24 .& •
*$3 *2 V Y) ' ( 7. •
i.' -$) 4 4 A3 @3% = • *24 . F4 A = 6 <$) : •
*$) N (J f D'8( 7 R4'( •
* : D A 1 Y. $ 4 ‘ ( 27 = • 1 Y. 2%: 'H $34 , < ' R % •
-$3) , j A < < 'R % •
1 , •= $7 2, 4 < ' R % •

4
0()*+),-. /+ PKI & '% ! " # $

$@+ AB
'. f -$3) , $ ! A •
% $3 ^, "
4 ) 2. '7 - +) , "' S$ •
<4 %
'" 2. > A f • i7 -$3) , 2 < 3 A6 S$ • F)'= 2@" , F ^ 3 -$3) , • -$3) , 4 3)/ S$ h rg
$) )$ " 7 e$) ) $ 4 ' f < 3 A6 2 I Z
</ R B D f 4/ • '8( 2 Y
U2. ' 24 . < A >4= 2A Z 4
^Z' R4'(
'Hg 1 , •= $7 %= •
h $@+ AB 2%: 2. '7
1 , F3 23 > •
8;) ?6 2_ Y •
, ?6 - % 4 •
)$ BZ " 72 - +) , •
*$)
3. D 54 6 $4 7 R4 A • 3. 4 N" • 4.
S$ •
0()* +),-. /+ PKI & '% ! " 66# $

D - 9 C' BA = ( < 2

Y: 5 6 *hmvvk A = R X g $3 & 4 < 4 % i7 A i7 F3


k
2 34 , 2 $33 $4 7 i7 'J , $B hmvvtg +4
] i7 1 Y. X4 , A NO. '" $4 ) * $3 $) y $33 - Y.
*$3 4 1 8;) - +4 '7 ?6 % $)
F W= - : '6 h % A gm A
hmvvm F A 24 X mvvp F A >Y"g (IS) ?6 . w'
mvvp p '34 :g 2. ,: Z 5 E( . ' % , w' F W=
*hmvvl F A > 3= RE
Y >4 hi7< A g I 2 A % 8;% ! i7 A
$' !4 A >4 ~ * '" >4 > A@ !4 A i7 T, < ' 8(3 R
i7 A 8;% *$) i7 T, A 2 5A @, ) OE < '3
e $3

L (< L (<
-$33 A V 6 '" < 3MA ! i7 < @" O X4 A 4
i7< 2 BZ' *$ ') \?6 J7 24 '"' $3 -$ ') A
i7 T, *$3) ) -$ ') A 4 -$33 A FE $3 ' Y 24 '"'
V 6 $3 $4 24 .& X4 2. % -$33 A V 6
*$) 24 .& f J 4 -$3) , N4 J '6 4 24 .& -$ ') A

1S%2
r
) $' 34 -$3) , 4 :$ M = R
c4 A '"' X 4 ' fIb i7 < 4 % *$3 , 3 F= R Z b
iE, % ƒ @_ hmvvmg >Y" '+ A *$3 >ŠAO 49=<
?6 '7 '6 2. > A $ S </ $4 7 34 < $ $3 4 24 .&

1
. Egger
2
. e-trust
3
. Garbarino & Lee
4
. Anonymity
0()* +),-. /+ PKI & '% ! " 66# $

4 24 ] < $ 4 : Z - Y . '. ' $B : /^A" F4 2 B, '


$ / '" >A4 O ( R4 >4 A *„ : Z < +4 7 :/
</ … Y 4 4 FG ') 4 </ < : ] „ A ƒ ') •
) C7 ' 2 < 4 % i7 F3 j . >4 * :[O
k
> $4 ,g $ 49=f ./ '7 D'= J'87 4 < 2. R ) 6' 7 A
*hmvvv F A

(< >;
S hkg e$3 4 % '. C 7 F3 K' i7 -$3) , % A
, J hmg F3 '7 8;) ?6 4 A -$3) , i7 $4 7
1 ,R ) L $ = F3 >4 X4 *m</ <$ 7 G -$3) , 24 .& $4
4 F3 > 3G <$) : % * = -$3) , -'E 1 , 4 BZ
* / $ '7 2. $ 2. M/ % $) >ŠAO 2 4

4 *V b C , H .= ( < & @=
2. BZ' R ' , :W4 ! i7 A i7< A $3 A
i7 F3 X4 <$) : , S A NO. *2. 3n ']' n
} g$ `''3 . Y - :$4 , > 3MA *2. Y PI ; ,
*hmvvs >4 '

- <G H : F 5- 1 > E1 3

% K' >4 .. 423 j -$ '"' :$ < 423


/S . . B.' ! j $E : 4 4 < '3 ?6 < !, 2 A *2.
A F; - +4 V 6 *2 -$ )'= ^ '" 6 .
2@" 1? >4 *$ ') 1 = 2, 4 D. 6 . i.' ?6
?6 D E < '3 . ': >4 3 ['O. … Y 4
' S 2 i.' $7 4 R Z PI ; -'

1
. Friedman
2
. Window-shopping
0()* +),-. /+ PKI & '% ! " 66# $

'7 - B \', 2 A '% 3 ?6 < . C'87


*$)
-$) • X.805 $ . ITU-T i.' )23 AB $4$" - +
*2. -$) • ;% : -$ % m k R ) 'J </ 3 B 2.

>., 4 (* . # *= X ! 8 ,

e2. -$) N4 % AB >4 :q 3 B X4

< 3 A6 . . D 3 *$4 A :'I" )^3 b - Y. : •


-$) - 7n ?6 ) Y' . . - " !@ , @3 $
*$ $7 1 : D ?6

*$ -$) 4 . 3) ? Z - Z w 24 '"' $ < 3 A6 41 > R •


$4 A 54$8 $- 2 )w X4 4 24 '"' 8;% 2(J 24'
*2. - - Y. b 'J IZw 4 24 '"' $ < 3 A6

,: 'J 24 '"' 4 , X4 i.' - i RA 4 , N < •


*$4 A :'I"

< 3 A6 - + ( *$4 A 2 ,( b %, - >L & ) •


*$3 @, R Z b 24 '"' i.' - 4' ( $

?6 $3 <4 " OE > iE, ?6 $ < 3 A6 - H 4 •


*$ ') A V (3 4 PZ' w E >4 >
0()* +),-. /+ PKI & '% ! " 66# $

R E - * ) >ŠAO - 2(J . ') f"' >L 4 ( •


*$ ') 2 , ( +4 - 4 " 4 <$) V 9 b H

) = . . B A '+M , $ < 3 A6 1S%c •


*$ $ $7 1 : D ?6 -$) - 7n ?6

') :'I" ) @/ -$ % $4 2. ?6 S 2 ,( 9 A K1 R •
4 , H" 2 BZ' $4 A -$ % X4 4. & DL * / RA
4 < '3 2. ' ) -$3 •4 . X4 !@ S DNS IP j /
*$ ') 2 , ( $4 J'87

- G (R 3
. 2@" S: 'A %; ) 4 4 X4 BZ X4 Z :
R % 83 >4$3G IA X4 *2. IA X4 %; BZ > 3G *2. b c4
>4 6 *$) $ '7 - 'A = k-$33 IA i.' 2. S: 'A IA *2. -$)
P% 2@" ! ! 3MA 2, : $ '7 S V$ 2@" 4 F3 S:
m
'A < / 2.$ IA V $ )< . = . 4X $4 * 49=f ./
e 'A P4 B 4 'J IA < ' $E > 3G *2. p b c4
2. 'AB BZ IA < Y~ IJ $ I b Y 2. P4 B
4 2. . >4 4 $3 . 4 $ Y >4 *$3 y
> A S FTP $3 •4 . 7 D L < '3 *$3 > B ^4 Z < ' b
2 B, 7 *$3) D B, b +4 7 D B, . 7 2.
7 X4 . . 1? $3 $ A) J; 2 B, I 2
'J b $E >4 *$) $3 '7 &' ( )23 2 $3 i4 )
*$ ') P4 B 4
*2. -$) , 49= )X 4 2. = . i.' e •

*2. -$% , 49= )X 4 2. = . i.' e b •

1
Attacker
2
Vulnerability
3
Unauthorized
0()* +),-. /+ PKI & '% ! " 66# $

1S%2 3
4 ) 49=f ./ $ ' $4 1 ' c4 " @ X4 . ' 3
b F3 S < 2. . PB] X4 49=f ./ *$4 A - Y . 4
* / ,
k
Y R 2. •O7 !, S X4 49=f ./ 2. - <% R.
4 'J 49=f ./ < ' Y4 B > 3G 3. *$ y - Y . 4 $ ' $3
e 'A $3 .
4 !, 2;. .• ;% 4 6 2. 49=f ./ z 6 49=f ./ •
$ '7 '" . 49=f ./ 5 Z .- = b I * ') RJ !, S
*2)
A . .- = O7 2. 49=f ./ z .- = 49=f ./ •
* ') RJ ) EZ 6
. X4 $3 = O7 2. 49=f ./ z $3 = 49=f ./ •
$) ) ’ ,F = ' AI • . . A . $3 * ') RJ
* 'A D B, @/ 49=f ./ •4 . < ' 4

de1 3
$ ' 4 c4 4 IA X4 2 E,' 'J * BZ X4 b c4 2.
e 'A $ '7
* ) 4 4 X4 . . - ' b F4 !, 2 zm . . F4 !,
*$3 </ . . , ! ?6 % 2 zp ?6 %,
* ) 4 ' ‡ X4 - b< H 2 zr ?6 V (
* ) 4 4 ^3 $A < 'A $ 4 D?(A] 2 zs2 $7 2B A
*2. " R Z -$)^4 ' ) < ! 3 'J . •4 .

1
Krusl
2
Increased access
3
Disclosure of information
4
Corruption of information
5
Denial of service
5
0()* +),-. /+ PKI & '% ! " 66# $

< ! 4 ^ 3 < 'A $ 4 D?(A] IA V $ 2. > A < ! 3 K'


$ . 2. S ') .< , 3 4 -' , 4 CPU < $3
* : $-
!4 . " $ : Z IA ' '( )^3 ) 3 K'
D H) $3 4 % ) ' D L < '3 * ') R ;
*$) $ '7 " ' R % ) IA $ 3@= A F;
2( - : 4. : ) IJ - : $3G - Y. " @ -$) ^4 ' K'
*$3 Z IA ' J 7 V$ - : >4 < !A 'O ) '7 D 3
* ) 4 4 ^3 b - Y. 2 zk ^ 3

(@ > D ( L 1 - G (R =. 5 3
2. - 'A E @/ IA -'( "' 4 ?A >A 3 <'A .
*2. -$) N4 %

):7 !89! 5 3

</ " -$) R8 . '"' R4 , $3 • j 4


2A Z >4 $ '" j 4 YI ; K ' *$34 A 4 '7 $4$" ; R4 ,
*2. -$) 7 = @/
R8 Z '‡ • " R4 , X4 $3 4 j 4 zR4 , < :$33 - '/ •
* ') D B, R4 , </ " -$)
*$ ' koov j 4 >4 ^4 ) j 4 >4 z $ - . < :$33 - '/ •
m
' IJ $ - ' $3 2;. X 4 A . ' j 4 K' >4
j 4 $- ' <$) f8 *$33 - '/ S X 4 DOS $ -

' S X 4 B4 . 4 j 4 > 3G *$) $ '7 " $-


$) ) Z S X 4 -$3 : S X 4 'J -$) ‡ - Y.
$4$" R F4 $ = *$) $ '7 $- X 4 <$) >) < .
$B -$) . 4= " 7 . 4 j 4 > 3G '" R .
*$3 D B, - j 4 >4 A

1
Theft of resources
2
Master Boot Record (MBR)
1
0()* +),-. /+ PKI & '% ! " 66# $

$3 $3 = &' ( !, S 4 <A j 4 >4 z j 4 4 •

</ i.' -$) 4 R4 , @3 . 4 > 3G % *$3 2, . 4 =-`


=-` R4 , < 'A - '/ •= I j 4 4 D L < '3 * : 'J
* 'A V 9 </ 4 , ] R4 , 4 F;

):;8< 5 3

V ?7 *$33 4 ) 2( '7 , ; $3 4 S
K' * : %3 ) RE 'O $ ' ') R8 I4 , S 2 S j 4
*$ -$) . 2A Z >4 '@% S
$3 4 % 2 = i.' S . >4 zk-' = S •

*$33 RA < " 4j 4 S , V$ <$ . ‘ (


. >4 *$3 ) R % >4 : ! ) ^IO S zm ) ^IO S •

V$ •. 3) RA S : > *$33 RA I r % '3 S


n'Y •= -$) b/ 49=f ./ > , 4 1? V $ & ; •= * : S
% '3 $' -$)- '/ ' ‡ •‡. -$) _<" f b S V$
*2. -$) - <% p kR ) S . >4 % -'( * S

D =/ D =/
N f >WC 7! f >
=L = 7X
_ 7"
' 7`

f > D =/

., [ I3 >N ' .IR " ! 8,

1
Mass-mailing worms
2
Network-aware worms
2
0()* +),-. /+ PKI & '% ! " 66# $

): ! 8= 5 3

< '4 - ‡. < . %; </ *2. -$) , : @) Ib -'( S


@) f >4$ $ '%: - ‡. Z - @) •= '. 'G .
$3 - '7$ > A" @ 4 . - V$ '‡ •= ! <" *$ 'A - J (
m k
24 4$ Q F4 4 - $- f8 $I ] 2Q I" 2 Q
*$34 %: $34/ ,
K'Z 4 > B D L < '3 $3 EO3 fA <" +4 K'
*$ ') D B, C 7 RA

>$)? 0@9/8* 5 5 3

, X4 <$) = *2. ) 4 4 IA - 4 , !4 . R %
X4 - Y . ' ?6 $3 ' -$) !4 . , !, ?6
%= !4 . ?A > 3G '@% K' *$34 A R ; N (J " 7 . V (3
* . R; " 2. Heap ,

ABC 8DEF-B G ,? 1 5 3

. $ : S </ R = ) 2( IA K' >4$3G 2A Z >4


*2. -$)
_ ) +4 24 '"' f Z " @ </ 6 2. $34/ , z ? •

4 MAC j / ? <' ? • 'A < '3 * ')


* S ) 4 IP ? )-
@/ w -$) R7 Z< ! 2 % " @ IA >4 zp • 2 % •

*$3 2 7 TCP FTP $3 •2 % TCP 4 IA >4 *$4 A ^OZ


'" ? % . ) $3 = Y. z . ) ?A •

- . IA X4 ) >4 *$ -$4 : ^Y -$) $3 . )


DA * / 2.$ ) I . <' MAC j / ?
F . ) ?6 <! <' ,%= 9:!
* ' $ '7 -$ M = :< >4
1
Session logging
2
Keystroke logging
3
Session hijacking
3
0()* +),-. /+ PKI & '% ! " 66# $

$3 ) 3 ?A & 2( ?A z& 2( ?A •

54 6 & 2( *$ ') 4 & < ] '3


+4 - - +4 = @ 4 . & -? $ ') " & +)
< '3 *$3 y TCP/IP R = 4 ?A >4 *$ : !
H & 2( X4 2‡4 . X4 < !, $3 ?A <' 'A
- Y. & 2( X4 < 'A & 7 V 9 & 2( X4 =
R4 , < H & 2( X4 - - +4 = IA S'A '
* S & (YJ X4 < @3=

/HB. @ / G ,? 2 5 3

' ! $3 1? 4 ?6 . ' 3 "@ ?A K' >4


}3 , - Y. ' ! < j$ 1 <' 'A < '3 * / 2.$ .
* S ' ! 54$8 V 9 F; ' 3 H ' ! > A AI

).G K 0/!LI,J G ,? 3 5 3

?6 /^A" "@ + 'J J 7 IA >4 < $ ?A K' >4


m k
F4'= >)+ < S A% . $3 ?6 /^A" D $ 1 * =
p
B. ) 2 >,: 4 " @ < 'A S A% . 1 3
* / 2.$ ' ! S $3 ?6 $3
" D R . D B, < ! '‡ >,: " @ 2) + 1
*$4 A • ;% )f Z IA -'E V $ < 4 " •4 .

)M'LN : ! O),J)M 4 5 3

S >4 PI ; 1 <': ': V $ @/ *$33 IA 4 S


*2 G @/ V $ $3 G @/ $4 $4 < A" @ $3 . ' 3 *$3
*$ S IA % 4 X4 V $ X4 . '3 2. ,z "@
*2. BZ X4 V $ 4 ' 3 zV $
*$ ') E . t < A" @ V $ j .

1
Sniffing
2
Mapping
3
Secuirity scanning
4
0()* +),-. /+ PKI & '% ! " 66# $

'‡ . < 2 B] F G ' 3 $3 A" @ zk : 37 •


*$3 IA
/2. ?6 . '3 $3 A" @ zm< .'. " •
*$33 IA 4 $ : Z - Y. ' . .
. . /2. 2% f 4 ' 3 $3 A" @ zp + •

*$33 IA 4
Z 4 /2. '3 $3 3 zr} 3 A < A" @ •
*$33 IA
4 8;) /2. ' 3 $3 A" @ zs , < 4 3" •
*$33 IA
*$33 IA 4 7 '3 $3 A" @ zt< 7 •
4 j ?6 . < '3 $3 A" @ zl D'T , •
*$33 IA

23 > 2@" .3 ! )9: '7 ^4 . $) +! I


< E +! j. 'A $ I 27 . 4 < >4 2. - 'A , ?6
*$) 24' S$ + ( 2 A 3 '+;. =

(< D ; 6 (PKI) (< I 4A 1 4

BZ *$) G 4! , G 6 A 4= 23 A
X4 24' $ ' 4 - .“ • ;% S! A 4 4! , 6
, . @ T + - @G $3 24 ' 4 . 3) •? 4 6 24 '"' 4 ,
24' / 6 *$ 3 4 . 3) 0 . 4 A. 3.
*2 - . $ I6 -$ M = S! A 4 2 )/ 24 '"'

1
Hackers
2
Spies
3
Terrorists
4
Corporate raiders
5
Professional criminals
6
Vandals
7
Voyeurs
0()* +),-. /+ PKI & '% ! " 66# $

] > 'A ) 4 24 ' 24 4 $ $4$" > - 4 >4 3


*$)

(< D ; 6 (PKI) (< I 4A 1 ` ! 8,

, 4 T •4 . 2. 3 27 . 4 (PKI) 'A $ I 27 . 4
24 4 $ $) 4 4 2. . !, S !, 2;. R ) 'G @G $3
2@" > T, X4 > 3MA *2. S 4 ': $ I ^4 ' .- 7n 4
4 ': 4 T +! - Y. ) 6
$3 - Y. ': $J ! -$) J aD 4 ': 27 . 4 >4 *$4 A ,
*$4 A 54$8 !A F3 X4 : V 6
R6 ! A D 3 ^4 ' $ ' 27 . 'G G 'A $ I 27 . 4 >4 3
e $3 'A $ I 27 . 4 !" *$3 , ': <
<!; X4 (CA) ': $J ! $3G 4 X4 A . !" •

ˆk ':

1
. Certificate Repository
0()* +),-. /+ PKI & '% ! " 66# $

$3. $3G 4 X4 hCPg ': 2. . $3. X4 R ) .$3 •

ˆhCPSg ': 4 " RAB ' .


IA < 4 " A ' FE -$4 1 ' / R3. = $B •

*$ -$@ . $@+
$J ! 'A $ I +! '+ 4 ': 'A $ I 27 . 4
Sb .- : ) 3 AB X4 f Z I I ) ':
e : 4 ' . D'AB PKI X4 *$3
. < ': $J •

4@ S 2 Q !, S •

': ' 4 +G ‡ 4 •
': D O $4$ 24 4$ 4 ! •

w' %= $7 •
<' $ • T +! 2IZ 'A $ I 27 . 4
- 2 A … Y 24' 4 . 3) R ) 3 •4 . • 2I Z >4
* - Y. 49= + (
'@. b HR E . - 2_ Y 3B 2 B " … Y 4 k2 A
' ?6 - 'A $4 3 2 B " …Y *2. $A 4
< i.' 4 - 2Z $ ' A 3 G : *2) + 2. .<
i.' H A $3 > AT $ ' $3 4 $ ') - Z .
7 : *$ ') DA . N (J R ) $ ') 2. '7 <
:'I" ' 3 *$33 )$7 @/ 2 B " $3 H . -
.. X4 - 2 B " < 3 A6 54 6 >4 4 "& 4 . O7
$ H '( - $' x 2. S ' 3 >4 * ') &' (
? H >4 $ 4 H b , i.' ?6 I : 3B4 * '% • ;%
'A $ I 27 . 4 *$3 B ,4 ?6 ') "' -$33 2, 4 $) '@%
-$33 2, 4 : *$ 4 ?6 T 54 6 - 2 A …Y 2 I Z
</ $3 $ 4 -$) 2, 4 ?6 '"' T $ ' -$) T ?6
*2. - H $ -$) T ?6 </ '( $ 4 $' 2. 'J

1
. Integrity
0()* +),-. /+ PKI & '% ! " 66# $

*$3 4 . 3) -$3 . , 4 24' S = X4 -$ : 2. 3B >4 24'


*$ 4 S = T 54 6 ! 24' 2I Z 'A $ I 27 . 4
?6 >4 $3 ' b , I ) 2. . - 2_ Y + (
+ ( < . 3 3" >4 @ ^Z *$3) ) . .
j . $4 . @/ i( 2_ Y K' >4 *2. ?6
$B 1 ?6 + ( …Y * 4 ! ') ) + < Z
*2. ?6 + ! 1 >4 f. 3 >4 = 4 * - Y. < '
'A $ I : *$3 4 + ! 54 6 - + ( 2I Z 'A $ I 27 . 4
': S ': f J @3 ') - Y . ?6 +! ': X4 '"'
<' 'A $ I 27 . 4 *$3 4 %:! ?6 </ $ ' 2. -$) n
* Z - Y. ' ' 4. DE I ?6 +! '3
*$3 XA ?6 49= T 54 6 'A $ I 27 . 4
n ': F 4 '"' , J $3) -$) T 'J ?6 'J
<' f >4$ 2. ) . . ?6 T ': </ J'87 $ I -$)
*2. -$) D . $ ' ': f J I .' '! ?6 'A Q
$3 , T, 'A $ I 27 . 4 4 ! j . >4
'J ! >4 * 'A $3 . 2. -$) - F4 A s k R ) 'J <'
^Y 4. T, $3 - RA BZ '"' ! 34!+4 "
* .

1
. Authentication
2
. Confidentiality
0()* +),-. /+ PKI & '% ! " 66# $

K> 5PKI . 1 > /= 1 >. ( g ! 8 ,

>LM 1 * K > J (< I 4A 1 /+

9A (< > I
$I < E +! V ?7 *2. < E +! 3 'A $ I 3,
$I < E +! ') - Y. ?6 4 %:! +! @%
]4 3" -$) $ ' < X4 $ I >4 *$ ') ,: >4 Y
+4 $ I ') - Y . +! $I X4 : '( $3 i
- Y. $I Π>4 $ ' 4 4 '+ * ') ,: 4 %:! 2 4
-$ 'A $ I $I 4 'J $33 > AT K']' >4 $ ')
$ I * 'A P% : . <' A J'87 $ I 3B4 +4 $ I : %3 ')
(CA) ': -$33 J ! <!; 54 6 - : '6 -$ 3: ': 'A
J'87 $ I * ') $@+ ': f J ! J'87 $ I * ') %3
@ ': f J E D 3 Π7 !: $ ') - Y. T 4 . 3)
2 L Q^" ! <' $ +! J'87 $ I *$ ') A
* 'A 4 -$) +! ?6 < ' S ! 'J 9:
* ') - Y. 4 . 3) T +! 'A $ I 3,
-$33 2, 4 'A $ I -$3 . , ') - Y. +! 'A $ I 3,
1 '7 J'87 $ I 4 %:! 2 4 -$33 2, 4 $3 - Y. +!
*$3 - Y .
0()* +),-. /+ PKI & '% ! " 66# $

$I -$3 . , ') - Y. T 'A $ I 3,


'A $ I - Y. T -$33 2, 4 $3 - Y. +! 1 '7 J'87
*$3 $ 4 -$3 . ,
-$33 2, 4 -$3 . , ') - Y. 4 . 3) ' 3 'A $ I 3,
$3 T '7 J'87 $ I - Y. $3. >4 -$33 2, 4 $3 • $3.
$4 $3. '"' T -$33 2, 4 24' -$33 2, 4 'A $ I - Y. -$3 . ,
*$3 . Z </ 'A $ I ': 4 . 3) ?6 •‡. $3

UCAT ! , , > /
': 2. A ' 24 '"' ': $J ! X4
! X4 '7 ': ': $J ! *$3 %3 J
2. ! ': $J ! NO. >4 * : ': $J
m
%4 4 %4 ': $J ! $3 T 1 '7 ': '7
DO % $J Y _ ': $J ! *2. -$) -$ A '
': 2. . 3. 5 O 2 4 P4 _ > 4 $ -$@ ':
*$3 S '7 w' (CPS) ': 4 " RAB ' . (CP)

"
> 2R
X4 hSubjectg ': -$ < '3 F 2. 4 '"' ': f J
': </ f J i.' ': X4 1 49= S +3 * ') n ':
'"' 'A $ I i J'87 $ I $3 54$8 2E E
+4 *$3 - Y . $) 6' CP ! 5 O3 ':
'"' 'A $ I i J'87 $ I 49= ^Z ': 1 49=
. 4 C ;) $3 ' ': < J *$) 7 2( , J ':
*$3) 7. 4 !" 4 D 4, .&

1
. Certification Authority
2
. Root Certification Authority
3
. Subscriber
5
0()* +),-. /+ PKI & '% ! " 66# $

!
L (<f H
e$3 - Y. 4 ' ': 2. 4 '"'
*2. -$) T 4 'J ?6 -$33 4 24 '"' 24' • ;% •

-$) T 4 'J ?6 < ' - '; 2. +G ‡ 4 . •

*2.
< ' w' a 2(J A 54 6 ': X4 f J ( w 4 •

': </ '"' 'A $ I ': </ f J S


S = X4 8;) : D L < '3 *$) ': f J ! '7 2. > A -$33 A V 6
f J FE • ;) </ $4 A D . -$) ! -$) T 'J 2 = 54 6
V 6 FE D > 2. - - Y . S = < 'A T 2@" '7 J'87 $ I ':
! 2@" ': '"' 'A $ I - 'A A S = -$ : ': -$33 A
*2. - - Y. - ) ' S = < 'A
</ 2. -$) Π': '3 ,J ': 2. S!I -$33 A V 6
2 4 -$33 A V 6 > 3MA *$4 A - Y . 2. -$) - N ]' 6' CP '6
SA ': < 34 </ -$33 J CA A F= ': 2(J
*$4 A D 3 $) -$% D O ' ': $) -$ .

UCPT X , , > >4


': 49= > 'Z 'A R ) 2. $3. CP
> A $3. >4 *$3 > C7 3 !I >B .? NO. 4 • ;% 'A
A 2 I Z 24 Y C'87 : A8 XA ' 3 -$33 A V 6 i.' 2.
CP * : Z - Y. ' C7 X4 ': f J X4 5IB 'A $ I X4
PKI < > $3 h CAg ': $J ! 24 ' S i4 )
2. > A CP X4 'A < '3 *$33 N4 % $ I - 7n $ ' + '+G
: V 6 24' 54$8 • ;% < 3 A6 NO. ': K' X4 49=
N4 % • ;% 2A Z c X4 $7 4 2@" (B2B) - +3 - +3 F3
*$4 A

1
. Relying party
2
. Certificate Policy
1
0()* +),-. /+ PKI & '% ! " 66# $

UCPST ! , , > 1 + 8 (*
': $J ! X4 $3 4 " 4 ': 4 " RAB ' .
$ $ ' 4 $4$ D O 24 4$ $J 2 B, : (CA)

4 " RAB ' . *$) ) D 3 (CP) C 7 ': 2. . $3. X4 5 O ': $ I


- / ': X4 4 F=2 4 J'87 $ I X 4 . 3) $I !
* '" ! >4 RA $) < ! C'87 $B 34!: *$3 • ;% $ ')
\'E < • ;% ': $J S +3 4 >4 (CA) ': $J !
> 3MA 4 " RAB ' . * : -$33 A V 6 ': f J $@B 'Z
4. " 'A $ I 27 . 4 < 24 '"' +4 C 7 ! 2. > A
': 4 " RAB ' . $3. 'AB *$3 P4 B A RZ FE
- 'J i hCPg ': 2. . $3. 4' A 2E O .
*$ ') +

, , >
! 'A $ I ': 4 X.509 ': D 4 ': +4 S ':
* . i 'A $ I X4 24 '"' X4 24' 2. - R4 , X4 ') -$
b/ u4 hsubscriberg ': f J 24 '"' S $3 ': IJ !"
': . 3) X4 hCAg ': -$33 J! S 'A $ I ': - <4=
i z2. ': $J . S! -$33 N4 % z hCPg ': 2. . $3.
T 'J </ -$33 J ! i.' ': X4 '"' ?6 * .
* ') ,: ': %; < '3 T >4 •= </ ')

UCRLT XL 8H = > > 4@


': $J ! X4 I .' -$) J ': . @, -$)R6 ': 2
! </ '. • ;% R4 2. -$% T E3 @/ '3 2. hCAg
*$ ') R6 YI ; R4 2. > A ': *$3 $Z , -$) D O
>,: Z %, ’ B 4 ': X4 < ?6 H 4 S! 'A < '3
A) ': X4 D O R4 ': X4 'A $ I i J'87 $ I

1
. Certification Practices Statement
2
. Certificate Revocation List
2
0()* +),-. /+ PKI & '% ! " 66# $

6' hCPSg 4 " RAB ' . $3. 'J -$)R6 ': 2 *$


': $J ! i.' % RZ : %3 - '8 2. -$) • ;%
*$ ') T '8 6' (CA)

!
N 4h 5
24' w' ?6 2(J . /^A" 2. 4 '"' S 2 Q ,
S 2 Q , * ') 4 $) $ '7 Π': ': < J
2. '7 DE 2Q 2 ': $J ! X4 ' f ':
i '] 5 O @/ w' ' 4. ': D O $J C'87 < ]E
T </ A $@B z ': $J ! '. -$) • ;% RAB ' .
*$4 A S $Z z2. - 'A

m
• ;) 2. ! ƒ e$3 P4 B '+34 >' 3, $ . I .'
$ ') - Y. 24' $ 4 ' ! 4 $ I X4 'A </ I . -$
*„$4 A D 3 ) 7
$3 ' > ' >4 $ ') - 7n >' ': i J'87 $I
'AB J'87 $I !, S >' *$3) ) !, 2;. 4 !, S 3
$3 !, 2;. > ' *$ ') - 7n !, S < '‡ D3
$ -$) +! ?6 2_ Y .- 7n $ ' $3A)'
*$3 S +! IA $3 ' ! @/ '7

1
. Registration Authority
2
. National Institute of Standards and Technology (NIST)
3
N 8 \\9 5
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

D O , , > N 895

. 6

'J A) BZ 24' 2. 3. 3) < A ':


T - Y . 2E E ': *$3 > B f
$8Z 2 34 T, 'J *2. ?6 +!
,B R E V 6 T A $ ' $) ) 8;% 24'
'" - >4 A) *$4 ‡ f < T - Y. '7
< 3 A6 ~ $ 3. +! < - Y. ?6 < ' ( 'J
*$ 3 D R
D'( T -' $4$" R ':
R Z • ;% C'87 ': - Y . ˆ2. -$) 4 ? B i :!
2) $ 'Z x 2 34 . S =? Z : 3B >4 2. 3. <$) +=
* : '7 'ZR ) ': - Y .
N4 % 'A $ I 27 . 4 IJ J 3 4 < '3 ': R8, >4
* : n @/ 4 DL ': K ' > 3MA * ')

P4@ Q , , >

i.' $3 $3 $3 'A $ I 27 . 4 . . !" ':


X4 'A $ I X4 R ) $ I ΠX4 2. -$) J ': $J ! X4
'J 2. ?6 'A X4 R ) ': X4 *2. w J87 $I
5O 4 ': *2. 24 'I r m> 4 E </ - $ 2. -$) T
e2. 4 - R ) $3) X.509 $ .
*2. -$) J </ j . ': X.509 $ . <` •

*2. - C 8 7 </ ': $J ! ': D 4 . - A) •


< 'A T @/ ': $J ! 4 4 '+ . 3) •
*2. - - Y. ': 4' (
* ': -$33 J ' ?6 S •
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

- ' S A 2 . u4 K ) 2 . u4 R ) ': - •

*2. B ': IJ , >4


Distinguished Name w' ' 2. ': -$ ' ?6 S •

*2. 'A $ I X : 4 '"'


* ': -$ 'A $ I •

': w' J87 $I ) !@ '‡ ' ?6 •

* - J
': -$33 -$33 JR ) ?6 •

* J87 $I 'A $ I w' ': 'A $ I •

* ') %= ': i.' $ T +! 4 '+ S •

R ) 2. 4 H R ) -$) J ': w' Z( •

*$4 !, ': ': $J ! 2. 4 -


*2. -$) - F4 A </ '"' - ': IE k mR )

UInternet Explorer ; 1 (T , , > ! X 8,

5
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

UInternet Explorer ; 1 (T , , > Details 4(@ V >L

: Tools '3 $ -$) - 7n f8 A) . 4 ': -$ %


Content w' (YJ $4A &; Interet Options 34!: Internet Explorer

hp m R )g *$ 4 A X I Certificates $ I

5
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

L L A_ 2 9 ( K @ =. , , > > L >' @ " X 8,

$ ' </ PI ; (YJ $) $ '7 4 R ) % - 3= 'J >4


': >4 X4 XI *$ 4 A -$ % YI ; ':
*$4') 3)/ % ': w' •!" $ '

5
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

L L A_ 2 9 ( K @ =. , , > > L > ' ` X 8,

, , > <

* :D 3 ' ': R 4n ' 2 4 ': X4 < 3 A6 D'8


@/ 2(J < 3 A6 D'8 R4 n ' . •= , J k-$33 A V 6 +4
*$4 A A ': X4 $'
(purpose) , , > L i •
• ;% ': </ ': : -$ % szm R ) '+ A
* : . K']' >4 2 4 ': X4 < 3 A6 2@" *2. -$)
-$) - F4 A 4 R ) (purpose) ': - Y . ' 3 'A < '3
(Protects e-mail : D. 4 54 6 4 S = < 'A >A4 2.
*$) A bV 8 ': >4 < 2. -$) n messages)

1
. Relying party
5
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

(purpose) , , > L i g X 8,

, , > 2R N •

J G ' ': $3 . 2 4 -$33 A V 6


8;) ': >4 2. -$) - < % tzm R ) 'O A *2. -$)
*2. -$) J (Reza Ehsan) < ] S

55
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

, , > 2R N j X 8,

, , > < k1 •

S +3 -$33 A V 6 *$) u4 X4 ':


*$4 A "' </ u4 2 4 ' ': 3.
mp u 4 ' ': : -$ % lzm R ) '+ A
* mvkv ' mp mvvo '

51
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

, , > < k1 l X 8,

U , , > L T , , > L •

V 6* : J ': $J ! X4 i.' ':


A ' 2 4 ' ': 3. S +3 -$33 A
* : >ŠAO ': -$33 J< '
R ) '+ A *$ <% ' ': - qzm R )
! 2( Digital Sign 1 . i.' User1 ': ') -$ %
/ *2. -$) J Zh : gS ': $J
': $J ! 2( h : gS ': $J !
A ' ': $J ! X4 $3 2 B, '% %4
* 'A A ': >4 <' • >4 9 ') &' (

52
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

.' 1 , , > /

N< , , > /

, , > < k1 # X 8,

UCRL 2 9 T L 8H = > > 4@ •

3 </ < SA F= ': X4 2. > A /


3. S +3 -$33 A V 6 : D O </ -$33 J! i.' I4
' ': $4 A . 2 4 ' ':
*$) '"' (CRL) -$) R6 ': 2
': -$) R6 ': 2 w' URL j / 'AB

$3 ' !, S (CRL) -$) R6 ': 2 f8 * : Œ


*$3 $% - 'A 4 . 3) -$) R6 ':
': $J ! w' (CRL) -$) R6 ': 2 2, 4
e$ 4 A B" 4 j / $ ' h : gS

53
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

http://mocca.ir

, , > < k1 $ X 8,

* , , > > 8, 5

h ': - f8 S$ g j 3) ': •

2A Z 4 R ) *$) ': K' >4 8;% } 2?


*$ <% ': K' >4 PI ;

54
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

U > L 2 9 N <T c > !a X 8 ,

': -$33 J 4 . 3) Z Windows : -$ % R ) '+ A


* ') -$ % 4 S H = Certification Path 2A Z > 3MA *$) A

Certification Path 4(@ V c > .= m = N n % L > ' !! X 8 ,

5
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

- f8 *$) -$% f8 ': - $ y 2 >4


: Jh : gS ': $J ! i.' ':
e$ 4 A B" 4 j / $ '
http://mocca.ir/

N< , , > / , , > > L 29 @

U < k1 N( TL F6 > •

R ) 3 2? ': X4 < >,4<4= 'J


<% ': K' >4 4 R ) * : _ ': 'AB
*$

1
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

U < k1 N( TL F6 > !" X 8 ,

L : 3= > •

*$) 4 'J -$) D O ': R ) CRL f8 'J

L : 3= > !` X 8 ,

1
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

, , > > O 1

Z - Y. ' YI ; $ YI ; K ' ':


e $3 ': K ' 7 *$ :
Client Authentication Certificate •
E-mail Protection Certificate •
Server Authentication Certificate •
Code Signing Certificate •
Time Stamp Signing Certificate •
IPSec Certificate •

e$ ') , : 4 ' $3 ' K' ': >4


(Identification) , 4 . 3) •
(Authentication) < 24' 54$8 •

$3 4 S =z- > H S$ < 3 A6 2 B " … Y •

DE -$3 . , -$ : i.' , J S =z- > -$ % < g + ( •

+! b . . :'I" 2@" $3 +! -
hD E > ?6
49= •

F3 <$ %; ' Z @" •

6 < > •

e2. -$) N4 % ': K ' X4

Client Authentication Certificate


S +3 client X4 . X4 : Z - Y. ' Z Client Authentication
< A client $3 $4 ': >4 *$3 2. '7 ': . client D 8

*$3 2.
': 4 < $ 4 $3 4 ': $ ' client $3 ': 2. '7 . Z
A R Z B client i.' -$) 4 ': 'J *$3 S $Z . D 8 2@"
1? . D8 2 ': 4 < $ client *$ D8 - " . $)
- " ?J 4 $ $ >4= 3 NO. . . - " client . 2. > A $3

1
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

e : S 4 'J 2. '7 R *$ $ . D8

' . 2. '7 Client •

*$ . ,

2, 4 . ': Client •
': $J ! 2 </ $3
! i.' . ': : *$3 XG B
Client $) -$) T B ': $J
$3 • ;% Client 24' Client ': . * 49= ':
* $3 2. '7

34 4 $3 D. ': 4 Client •
. ': D . < $ $3 1?
* ') R8

</ . D. ': Client : •

$3 XG A ' ': 2
>4 $) A ' Client ': :
': Client : * ') Z > 2 %
* $ '7 Z >4= 3 NO. > w . $3 D .

E-mail Protection Certificate


< > + ( < > 2 = 4 2 = 2 ,( ':
': >4 3 * . , </ < 'A T > 3MA S = '( < ! 54 6 R A4
e> 2 =

1
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

@3 </ 2.' = S = $3 > AT - ! ': f J R A4 •

<$ '7 R Z ' -$33 2, 4 i.'


*$)
'J ': f J R A4 •

2 Q 54 6 >4 $3 T 4
BZ </ 2.' = S = ')
*2. -$) D . ' -$3 . , '.
S = $4 A > AT $3 T 4 'J ': f J R A4 •

H -$% . -$ : -$3 . , DE > </ 2.' =


*$ -

Server Authentication Certificate


- Y . * ') J (URL) 34 j / X4 • ; 2. D 4 ': X4 SSL
RZ b 3 ”( -'S w ) X4 4 '3 ': >4
e2. & 3 "
B" <$ 4 .& j /> w > AT 34 j / X4 V B •

*$) 2. -$)
: > +3 ?6 +! 54 6 > w X4 4 •

*$3 <4" 24 .&


e$3 > AT SSL
* </ $4 R4 2. 4 . & < A -$) B" 34 j / •
R Z b . . 'J 24 . & < -$) D$ ?6 •

* ' $3 '; - Y . <$ '7

- Z w . client *$3 4 client . > > D 8 X4 SSL R =


SA $3 > AT D 8 K' >4 * B ': X4 . 4/ $3 D 3
>4 3 -$) RE 3 -$) ! 'J 2. -$) . client > 4 -
*$) <$ '7 R Z b 2 34 S'. V 6
D 2. -$) K $ • . 2 i.' 2. 3 R = X4 SSL J?7 '6

15
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

client 34 : I ) $) & ?6 > D E R = >4 c4 ]


- - Y. : '"' Public Key X4 -$) 7 . > 3G '"
- Y. 2. . @3 >4 $., . -$) $ 'J client ?6
@3 Private Key </ 34 2I * $3 Decode $ ' ,4 ?6 '7Private Key
.$3 -$ % ?6 </ $ ' A - > +4 !, S x 2. -$) f8 .
4. & $ client 6 7 < 3 A6 >4 . SSL '" +4 V 6
2.$ -$) . ) 4 IE 24 . & X4 $) </ ?6 < . , D client

.$3 RJ < 3 A6 </ < ' RJ 2 ?6 < /

SSL T : HS8DEF-B U )B=/ V 9 ) !@W 1

4 SSL ': K' “ 'A SSL 3 > 6 >)


4 3 ': O $J ! X4 -$ :•4 . +4 -$3 •4 .
3 ': T E u4 % w > , 6 24' 2. >4 CA Y _ *$) CA

*$4 A > B 24' </ j . $$

SSL Z F:+" RAY =0):/)X! ()* 1

L > 0 1 41 > 1o •

* ') >ŠAO -$3 •4 . X4 24' 2(J X4 SSL :W4 >4 - Y.


hInternet Explerer & : X4 “? L g -$ :•4 . 2A. SSL 3 !, S
X4 'A $I 4E 'A $ I 3 +! $ . X3
•= ') ^IO 24' $' hIIS & -$3 •4 . X4 “? L g -$3 •4 .
4 - A) $3 '7 ?6 < 'A 2 $' R < 3 A6
*$4 A S $Z -` 9:
L 0 1 41 > 1o •

-$ : •4 . 24' 2(J 2 4 2. -$3 •4 . 34 IZ2 •


S 4E •= -$3 •4 . 2A. SSL 3 !, S . >4 6 *$ 4 < 3 A6
-$3 •4 . R7 -$ :•4 . 2 '"' S -$ :•4 .
*$ •4 . - Y . - " '" 'J ') P4 B

11
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

L / - H •

'"' !, S i.' 2 4 -$ : -$3 •4 . < -$) ?6 I


4 %:! R E V 6 -$) hEncryptg +! -$ :•4 . -$3 •4 . 2A.
* ') ” ( . ':>4 hConfidentialityg + ( L$ $ ') hDecryptg

\ '8-F[ O 8D/)X Z)S [+ ( SSL 1

'J 2 34 : > 2. -$ )'= < SSL . X4 :$ M =


* ') 9 XG' RYZ X4 F4 A i.' w >4 '" > w Z
w' ') < :> 2 34 i ( 2. > A 4 f ./ >4 A@ 4
2 = ! 4 & w' ?6 ( @ ?6 2Z .
( @ ?6 '+34 $3) fZ 2 4 < R >A *$) @/
?6 < S +3 2. >4 >ŠAO (YJ ' 3 *$33 3ŠAO (YJ
e2. -$) - N ]' ' >4 * ') RJ < 3 A6 ' $4 ( 4 @
7 1L 89 I 41 W .= . 1 p(3 = •

*2. 2 L D '. >4 u. = U '" , 24 . & + $ . ‡ $4 )


iE, 24 . </ $ '7 ' 24 . & $ 3 '8 A) 2. > A 3B4
24 . X4 < ( ?6 D 2. > A A) - ' ' 24 . & </ )
*$ ) IE
e$) 4 S, $4 -$) R8 </ 4 . & URL j / 2. > A ?L
http://www.paypal.com:user=234368:transaction=432254@www.hackers.com
$4 -$) RJ www.paypal.com 24 . & $ 3 '8 2. > A O4 ) > 3G
www.hackers.com 3B4 * 2. -$ / 2? $B $4') RJ . / ^Z
) 4 _ >4 *$) ) www.paypal.com 24 . & ) (YJ 2. > A
2Z . 24 @ IB" 24 . < ?6 < 'A A) A fI"
e$ 4 , "' 4 'A *2. A) &
Z X ‡A , . b/ 2 . $3G @3 > AD
XI F=$ $% $4 >4 $3AZ? < 3 > 88; 2. -$ A
*$ 4 A R A 2. >4 >4 @ X ‡A i f O
$' O7 G X ‡A w' $4 < ' $3 Z? 2. 34 D '. D

12
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

U$) ) <
< )'= I i.' D $ 2, 4 w' 4 8 / $4 -$) 4. A) $ 3 ’ ,
A) 2. < ' svv iE, 4 8 >4 'A 2A Z 2. f " *$. 1 , < 4
A) Z '834 *$ 3 $4 7 'A </ & ) 'T 54 6 $ '
24 . < & ?6 2, 4 24 . </ $ $ $4 $4 $4 7 $8Z
A) - RJ ' X X $ 24 . & A) $4 2 1 '7
$4') >ŠAO $4 Q *$ 3 < 24 . & '7 & w' ?6
X 24 . & ) iE, 24 . </ 2. > A 3B4 *$4 -$) RJ < 24 . & BZ
A) & ( ?6 $ '7 2. ?Z 24 . X4 ^Z 2. A)
S $4 ‡ 67 < '7 X IJ 24 . j / ') @3% = *$3 2Z .
>ŠAO $ 3 & (YJ ( ?6 / F = •= *$4'% ,:< )
*$4 'T IJ 24 . & $4')
V = (1 m ?1 J 9 6 41 ( q = 1 p(3 0 q •

4 L
A) > -$) D ?6 $ ' A +4 • ;) x 2. 3B >4 >A4 w
RJ < 3 A6 $4 $4 -$) RJ IJ 24 . $4$) >ŠAO Z *$3 -$ % 24 . </
>4 -$) D ?6 2. Z >A4 '8 $8E . A) 4 > w $3
*$ ') D$ -$) ! 'J
R Z < +4 i.' A) D D ?6 $ R8 2 34 A) Z G
*$ ') D -$) ! 'J ?6 >4 34 + ' $ '7 24
*$3) SSL $3 @/ ( ?6 2 4 (YJ 'AB
>A4 : R ) 2 34 : 2 B] H $4') (YJ > 3G
$ 3 2Z 2 34 : •? $ ' ' 3 >4 *$) $ '7 - :/ w >4 < '
A•? > 3G $8E 24 . <$) RJ •= 'J $4') >ŠAO w < ' >A4
•? >4 *$ 3 '7 ( ?6 4 ! < $4$4$ '7 :
H https http j / 2A Z >A4 w 4 S +3 *$ -$) • ;% 4 R )
2. > A * ') _ : status bar 2A Z RYZ 2 ? $ 4
*$) Y RYZ >4 F4 A R( PI ; :

13
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

ks m R ) 'J '9 H $3 - Y . Firefox : 'J


* ') -$ % 2. -$) - F4 A

Http
s

Mozilla Firefox SSL . ) .= m = - n !g X 8 ,

'J '9 H $3 - Y . Internet Explorer 8 : 'J


* ') -$ % 2. -$) - F4 A kt m R )

14
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

Http
s

Internet Explorer 8 SSL . ) .= m = - n !j X 8 ,

XA $ ') J 24 . & SSL ': $) n M 3G


*$3 RJ < 3 A6 $8E 24 .& $33
RYZ $ ' 24 . X4 ': w' ?6 -$ %
*hkl m R )g $ 3 X I

1
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

SSL > L > ' !l X 8 ,

' 3 (VeriSign) B 2 ) X4 i.' ': >4 $ 3 ? 'O A


*2. -$) J ebay.com 24 . & • ;%

4.& ‘ ( $33 . ': :


-$ % < 7 / *$3 $% $3 - Y. B ':
S H = >4 'A *$ : A $" @/ O7 2Z x $- S H = '+34
*2. -$ / 4

2
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

> < r 9A ' > !# X 8 ,

[+ > < r 9A ' > !$ X 8 ,

2
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

Z 4 S H = > 3G -$ % •= IJ ,? A) 2A >4 >


$4 -$) IJ 24 . $ >ŠAO : •= *$ 3 24 . ( ?6 2.
V J A $) A) ( ?6 2Z . > A IE 24 . X4 2. > A
*$ 3

SSL /)X '!/ 5 1

-$3 •4 . 24' (Handshake)w R 6 $ •

* : • ;% -$ :•4 .
+! 4 '+ K' . -$ : -$3 •4 . K ) $ <A •

*$33 5, '
* : -$3 •4 . ! -$ :•4 . 24' S ! 'J •

$ I $3 ' 'A $ I 3 +! X3 - Y. 'J •

*$34 A 4 Y; )
*$ ') + ! SSL 3 6 •

] U )B=/ 0/ 8^8DEW<" ? 8 1 1

>4 j /g *$3 D. > (YJ X4 : 54 6 '7 2. '7 •

h ') K ) https:// 'AB (YJ


*$3 D. '7 ': - A '7 'A $ I .& •

2. -$) J < 3 A6 ' ! X4 i.' ': >4 4/ $3 XG : •

*2. . '7 24 . i 4/ '3


$ ' , 8 < E $ I X4 - - Y . -$) 2, 4 'A $ I : D •

-$) 9:! - •‡. *$3 9:! '7 - A $3


*$3 D. - 9:! . 'A $ I $ < E $I
- </ - Y. 4 %:! < E $I '7 J'87 $ I .& •

*$3 4 %:!
*$ : 9:! < E $ I XA . '7 html .& •

F4 A 4 %:! '7 < E $I ,4 - ! : •

*$

2
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

Code Signing Certificate


- Y. ' $ ') % 3 2 34 54 6 4 !, S Code signing ':
* : Z
2. '@% !, S </ source $33 $4 7 !, S - +) , X4 <4 % Z
$3 ' > 3MA 2. ) G !, S -$33 $ ' $3 • ;% $3 ' <4 %
$3 XA < 4 % R ' >4 * 7 4 2. -$) </ $3 4/ $3 • ;%
*$34 A : A8 $33 A D'8( </ $EG 4 $ ; !, S G 34 '
R4 , dynamic link libraries -$) T Active X controls 'J 4 %
$3 ' Code Signing 54 6 $33 'I 24 . & X4 HTML ' ( 4 .cab
2. -$) T 4 -$ / h-$3) ,g -$33 $ ' V 6 BZ $ $ ') >ŠAO
XG' F)'= X4 Code Signing ^Z *2. -$% & 7 4 - H
4 T ') 4 H E4 6 </ : $ <$) T $B *2. !, S
A R Z 2. -$) - H $ $) $ '7 - $% < 4 % $) $ '7 )
*2
$3 ' $34 A 'I Code Signing ': -$) T !, S < 4 % Z >4 3
*$3) >ŠAO ' ( 2 B " ! Source '( 2
4g -$33 $ ' V 6 BZ !, S $4 A $ 4 $ ' 4@ eSource ' ( •
*2. -$ / 2. - T </ h )
2. -$) T !, S $3 $ 4 $ ' 4@ e'( 2 B " •
*2. -$% 4 </ H
* D B, 3 !, S < :$33 $ ' < Code Signing

H S$ $3. 3) !, S -$33 $ ' Code Signing ': 54 6 < /


~' % 2 B, 4 $) D' Z R Z b !, S IA 'J $3) >ŠAO </
>4 *$34 A += ' -$33 $ ' B" $3 ' $ S @/ ' ‡ T
T $ < :$33 $ ' !, S < :$33 $ ' !4 A OE +=< 49=2 '
4 ! 24 . & < J !, S < :$33 $ ' B, 3 ': >4 , 6 *$)
@/ D'8( . P4 ( -$) @/ S A 4 f"' ': >4
* . R %
Code signing > 1/ •
'I -$3) , 24 . & $ 2B " ') >ŠAO % ' (<

2
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

-$% 4 </ H 4 -$% . !, S D E > 3B4 2. - '; 2. - 'A


*2.
' -$3) , i.' BZ !, S ') >ŠAO % 'I $B 41 > s 1 9
* + jA - 'A 4 . 3) </ $' 2. -$) $ '
) haction commandsg IA < , : L > = &Q q,1
*$3) -$) T B ': X4 $ 34 + $33 A D' Z -$) 'I $

Time Stamp Signing Certificate


3. T $3 +4 S +3 < 2 Q< 'A 5 Z 2@" D 4 @ 'J
<' @ - Y. * : Z - Y. ' 5, ' 4 Z IA"
@ - ) ' < @ X4 _3 - 'A Q V Y) '6
*2. -$% - H
- Y. ' PI ; ^4 3J > <4" +4 >)'I. $' @
' : 54$8 • ;% BZ X4 < 2 4 4" $' > 3MA * : Z
* : Z - Y.
e$ •4 . 'J @ SwissSign 'A < '3
@ '@A - ' < X4 2 4 $3. 4 F3 4 $B ' •

I( 'J @ •4 . :S % A 4 fIb 2 4 >4 $ ')


4 2. -$) i SwissSign @ %4 % I . 4 HSM X4
SwissSign - J87 . . X4 < '3 hHSMg I . >4 * :
*$3 RA $) C7 % X4 8(3
2A S " scalability IA -: -: - Y. •

>4 * : 4 $' 2 34 54 6 E 'J @ •4 . $)


*$) ) 2 34 : X4 iE, % 2. S 'J

IPSec Certificate
J'87 > 6 < 3 A6 'G G Internet Protocol security (IPSec)
34 ?A R E , i7 X4 $) +! S! - Y. )
*$3 , J'87 )

25
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

e . . V$ IPSec

IP 2 = '( 2 ,( •

24'E 2 =< I , 54 6 ) ?A R E , i7 < 'A , •


A RZ 6
*$ : ^Y $I 4'= 24 4$ 3 R = +! - Y. V$
$) 49=V OB $) '7 ,( $Z D > IPSec

24 . > WAN LAN J'87 )R Z ) K' 6 $'


*$4 A 2 , ( dial-up 6 2

, , > - R .A Q 41 1 2

TE < 2. '7 < $3) $( • ;% A D'6 ':


2. > A 2. Y i4 ) R H >4 * $ : '7 Y 2
7G R SA '7 $4 ': $J ! *$4/ F = ': X4
': $J ! RAB ' . 2. . "' R >4 *$34 A 24 4$ ': X4
4 @ 24 '"' ': X4 V B 7 G X4 mv m R ) *$3) Y 2. > A
*$ F4 A

, , > - R .A Q Xa X 8 ,

21
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

]E S 2Q •
* ' ~ $ • 6' S ,RA o

2. '7 $ 4 •

] E 24' 4 . 3) $ 4 o

?6 4 . 'A $ I 2(J < 3 A6 o

': $ I $4$ 4 $J •

* ') T 'J ': $J ! i.' ': o


* ') D. ]E ': ; X4 o
*h 'J g ') K" ] E 2A. 4$ 4 X4 o
* ') % 3 24 . ': u X4 o
') +4 ': ; X4 o
* ') - 7n . 2 -$) S ? B o

] E i.' ': D' Z •


</ - Y . ': ^4 ' •

R A4 4 & LDAPT 54 6 ': % o

h 6' CP Œ $3 i4 ) "' 'J g ': 5 IB •

h 'J g ': D O •

>4 ') R6 TE RZ ': X4 2. S PI ; R4 : o


H 4 ': ?6 H 4 J'87 $ I %, $ ' '
*$) ': X +
': T E •

>L R , , > > > = O 1 >. ( 3


, , IC

(Identity Management) E9)* )FC \ 989 ) _ 3


4 2 , Y) *2. 34 [O IJ ']' . 3)24'
>4 2 L 3" f $4$" D$ : ] @" 2Z %
') R ) 34 S " K ' </ Y3 3" +4 V 6 *$3) K']'

22
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

* ') w' -$) . 4 -$) -$4 IB" Y; 24' - Y.


S " >4 4 . 3) 24 4$ ^Z 4 . 3) ': - Y.
*$) $ '7 :'I"

(Identity Management) E9)* )FC \ 989 /+ \ !+ & ' 3


4 2 B, L 4E G 2. 2 "' ' ']' 4 4 . 3) X)
K']' >4 'A $3G n *2. >4 3 . . !" X4 4 . 3) $ S 2
e2. -$) N4 %
: R 4h •
2 i.' 0 4 $' ': 4
> •

4 $ S $' G G : K']' >4 V J 2 2Z %


' 54 6 ^Z ' 2. 2 >4 ^Z *$3 ^3 S
*$3 • ;% , 7 - ' <': ':
> V •
-$@ - +3 < $ @) 'A ?@ < 'A ,2 ' 2
Z $E 2@" < A= 4 . 3) $3 '7 2 ' >4 S *
*2. Y
K1 + .= (< 4 •

*2. >) '% @) NO. 4 " :$ . 'A 2 3 2 FE


• I= S " X4 K'Z •= 2E E * ') &' ( - ' >4 83 4 . 3)
, : Q ') 1? •‡. *$) S" w' $ ') ~ $ /^A" D '
</ <'3 , 24' $ 4 4 . 3) •= ^Z *$) ~ $ $ ') >4 f J <'3
* ') 7 3) - 3: 4 S 4 ,

*$ <% 4 . 3) 24 4$ 3 2 . . FE %; -$) n 'A


- Y. 4 . 3) 24 4$ 3 '7 Y _ FE $ ' 2 T,
54 6 >4 34 >A] *$ S V Y) ^4 . 5Z ':
*$) $ '7 4'" , J 2 34!

23
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

F-` /! a ! EAR'!8-A E')b9)D ) _ 3


' , $J ?L 3. +4 < ' @ 4 . 3) •4 . f 54 6
*$) ) 2E O ! 'Z Z'E !I '6 S 'J

EAR'!8-A 0/ A')D! E ) ) _ Z(H? 5 3

.- = - >ŠAO ( 24 4$ 4 $ . .' X
I7 'J F3 A -$) $3 4 EZ $ . > 3MA *$ - 'A
$' - ' >4 $7 * '" " 7 'J ' !I 5 Z 2E O
3. $J +4 $7 24 .& ) 2_ Y 2 : 4

EAR'!8-A ,RDZ(H? 1 3

T R4'( – G @ D'6 A 24 4$ -$ M = $34 , A 2 )


S $B S$Z $34 , >4 *$ . 3. 4 +4 D 3 2%:
>) 2 ' *$ I6 EZ -$) < < 2. 3 :
<' ': *$) $34 , >4 IJ !" $4 ' T 'O3 A
e 2 - ' >4 ': D'AB >4 * -@ ']' >4
h :$ . R Zg $ 4 R Z DE 'Z T 24' BOZ 54$8
* S =

c* H=! d R e =Z(H? 2 3

) 54 6 BO E E( c4 D $) E E( .'
*2. @/ I. < < ?6 >A4 . . $3)
> 7 E E( c4 : • ;% ^OZ '6 2. S > 3MA
+ ( - ' >4 <' ': *2. -$) % 3 G i.'
*2 " - @ @/ >A4 D E 'O3 A ?6

1
. Definitive authenticity
2
. Legal digital signature
3
. Verifiable electronic transmission of messages
24
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

EAR'!8-A \ G * ! \ C MDZ(H? 3 3

A• ^4 . . . $3 ,6 < . A < )!= : A


'Z E 5 O ?6 >4 + ( …Y D Z ,6 $3 < A ?6
i $34 , A X4 i.' -$) V 8 A 5 '. 4 *$3) D'
$@+ 54 6 *$) - ' >4 <4" ?6 @/ w' - > 3MA
<' ': - Y . +4 V 6 @/ 4 2 , Y) ,6 - >A4
* 'A > - ' >4 ..

EAR'!8-A \ !+ Z(H? 4 3

$3 *** @) 4 • I= -: R Z 2 4 4$ ['O. A
B.' * : …Y j ?6 + ( @/ $3 4 4 'Z !I
* ': - Y . $3 >A4 2

O)' ^H ? Z(H? 3
( >A4 24 4$ 2@" 4 R - $3 'Z $7 - ' < +4
T - Y . *$3) ( 'J ?6 >4 D ! ?6 4 R Z
] - ' >4 < ./ - Y . < > 3MA 'Z + ! 2 I Z f. 3
- Y. 'J I . 3@ - ' >4 I7 $34 , @3 4 $.
+4 > 3MA % T .$3 <'G ' 34! 4 3 @/ < 4 %
* :

IC > ' , , > > = 1 >. ( 4

V$ ': 7 ' 'J 2A Z >4


*2. -$) 4 $ -$) , : PI ; '% <': ':

F: 4
(IPO) Indian Patent Office •
$34 , A :S >4? / 'J ‡ 5 2. '7 7 2 Q 34 RZ
24 4$ S$ 2. '7 4 $B <'G ? % 2. -$) S . 'J

2
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

w' ']' S 2 Q2 . < ' > 4 = - Y . '. , @/ :$ . 2@" f. 3


*$ - ' " ' + (
S , >4? / 'J > ; ') 2, 4 >4? / 'J 2. '7 <'3
2Q : S < 2 7 < $ S 2 Q $34 , *$33 RA 2. '7
* : @ '@A 4 'J : S
e : - Y. ' 3 PKI D 4 ': IPO
eTrademark Registration o
* : - Y. S , - T Authentication 2@" D 4 ':
Online Patents Registration o
* : - Y. S , - T 2@" p j? D 4 ':

(Directorate General of Foreign Trade) DGFT •


*$ ') $ 4 >4? / 'J ') R A >4? / 'J 2. '7 . >4
4 Word R4 , 'J b 3. *$33 Login ': - Y. <
: 'I=/ DGFT . 24 @ *$ ') T 'J •‡.
* : Z$4 . ' </ H S$ R4 , : '; 2. < 3 A6 2@" .

E-Procurement •
. . : Z - Y. ' >4? / 'J 8Z 3 . 54 6 >4
< 3 A6 8Z 3 $3 + ( J'87 4 > 3MA : % 8Z 3
* ') RJ %
1 A 4( •

*$3 'I=/ 4 4 8Z 3 $3 -$) . '7 ': $4 7


'J >4 *$3 'I=/ -$3) , i.' - + ! 2@" ! '7 'A $ I > 3MA
*$3 4 %:! -$3) , i.' -$) 'I=/ '( $ ' $4 7 ': @3
L 5 4( •

*$3 'I=/ 4 4 8Z 3 $3 -$) . '7 ': -$3) ,


</ •‡. - 'A +! $3. '( - - Y . $4 7 'A $ I -$3) ,
*$ : '@A ! @ -$) T $3 A *$3 T 'J

3
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

UK Oil Portal 4
$34 , < 'A V$ . UK 2B3J <A = LCU $

4 O7 2E, ' I D '= >4 *2. - .- = UK Oil Portal D '=

$3 ' Y 2 ) > 3MA $ ') J -$) T R4 , 'J


S *$34 A 4 DTI D '= 54 6 - 'A T 'J '7 R4 ,
*2. -$) - Y . Adobe Acrobat !, S T

1f )Q98 L7 @')X\ )9 4
. . . D 3 2@" % < $3 . j! PKI X4
*2. - ' VPN 4 >4? / !, S 54 6
4 ; c4 2Z XA 2@" . ; PKI ! KSOS -

*2. - -@2 .
- Y . PKI -$4 ! (KDOT) j ! RE RA < A = - ?B
+4 V 6 KDOT R3. = ,6 < A= $34 , .- . f"' 2. - 'A
*2. -$) 9b S , V 9 54 6

F89 5 4

Revenue On-Line < '3 A . 2 R . $3 4 2


D 4 4'" , J . >4 - Y . *2. - 'A .- = Service (ROS)
> i ( X4 < :$33 27 = 2. 34 . X4 . >4 *2. )
*2. -$) - Y . - + ! 2@" PKI . >4 *$ •4 .

)R 8-* 1 4
(ABN-DSC) Australian Business Number-Digital Signature Certificate •
. . - 2. 4 - +3 A , 8(3 - A) X4 ABN
$4$" . - +3 < . I 4 . 3) 2@" - A) >4 *$
2@" - ' ABN i 2. ': X4 ^Z ABN-DSC * ') -

1
. Licensing and Consents Unit
2
. Department of Trade and Industry DTI)
3
. Kansas Public Employees Retirement System (KPERS)
4
. Kansas Secretary of State’s Office
5
. Kansas Department of Transportation
3
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

2 PI ; <: @/ F3 A < . - +3 >4? / 4 . 3)


S 2@" B2B ': >4 - +3 > 3MA * : Z - Y. ' .
2@" ': >4 24' 54$8 4 . 3) - ? *$33 - Y. ! - +3 4 . F3
* ') - Y. ! + (

&/

= !. j' ` : S '6 ‡ < ?6 < 'A ! E .


< .'. " - >4 2) $ A <. S = <'G ˆ . , '7 < $ ,
AV SA * H 4 R ) ) ) S = '<. $34 S = >4 >A)
* 'A >4!+4 " E V > B V SA >4!+4 " D V >
< Π7$ >4 3 * >4!+4 " </ $B V > '. V S A 2E E
>4 *$3 ’' Y </ RZV > '. V " -$33 2, 4 ' , S =
*$34': Caesar Cipher 4 '+

ABCDEFGHIJKLMNOPQRSTUVWXYZ
DEFGHIJKLMNOPQRSTUVWXYZABC

This is a test
Wklv lv d whvw
$' “$ - / ! 'J - ]4 - Y. 2. AI +!
?6 D E > 3MA ?6 . - 7n < I >4 *$ : 2
X4 * 49= 'J ]4 4 '+ - Y. + ! RA * . 5E( >
RE 3 -$ : -$) ! S = </ •= * ') ! $ I X4 - Y. S = X4 .
*$4/ 2.$ IJ S = ') $ I X4 - Y . "</ ')
4 '+ X4 + ! $ I X4 XA S => < HF +! +4 <
> Π;. Z 2. ^IO 4 '+ $I 8;) @3 'J *2. +!
'( $' $ ?6 </ 4 4 8;) $) -$) ! > IJ
*2. -$) y' 3 +! 4 '+ > ) - + < @3= 54 6 + ! *$3 $ = . . S =
< @3= M / *$3 +! 4 '+ < +A 2. </ ’, + ! $4$" 1
*2. $ I iE, 2.
?6 D E : RE 3 > 'J ?6 < ' + ! XA

3
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

RA >4 *$3 Π7! 2 @/ ?6 -$33 2, 4 *$) > h 6 D g


kryptos '4 H , : Cryptography AI * ') Y: (decryption) 4 %:! ^Z
*2. „> )' ƒ 3B graphein „ ( ƒ S'@Y

&/ >K 1 &

!
D 6 K 1 &

„~ % $ I X4ƒ $ ?6 D$ $8Z ,6 1 >4


?6 9:! 4 %:! 2 >4 *hmk m R )g $33 - Y. 4 %:! 9:!
2. V B ! @3= $ I +! 4 '+ >4 *$3) +4$ 4 j' B $34/ ,
*2. $ I </ $3) ) ~ % X4 $4 S = -$ : -$3 . ,
.‹ 2. m DES 4 „- 9:! $ .ƒ +! '@% 4 '+ X4
* ') - Y . p PIN 4 , 24' - A) < !
~ ) V 6 > $4 9:! w' $I 2. >4 1 >4 IJ R %
> > '6 $ I >4 $3 ' '+G V 6 $4/ F = D ‹. >4 ') ) 9:
DE $) > $ 4! , 'J 4 2 34 54 6 D E *$33 D$ +4$ 4
*2 > " x 2 34 </

D 6 K 1 & X! X 8 ,
* ') - Y. ?6 4 9:! < E + ! 2E E

1
. Symmetric
2
. Data Encryption Standard
3
. Personal Identity Number
3
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

^4 . , 8 'O ! $ I $ ' *2. 9:! S +3 2 . 1 >4 4!


> , 6 > $ I ^4 ' w T $I $B $) n ':< A ˆ ') S
1 >4 - Y. . >4 S A '" *2. < E +! • E >4 A@ w
*2. , J ? ?6 +!
*$33 H 'J $4 $ ') ^4 ' >A4 D X4 54 6 $4 < E $I
*2 , ~ % @3= $ I X4 '" $33 Z w $3 '; Y : D L < '3
Y w $33 Z > 6 54 6 >4 $3 '; Y @G 'J
' $I $B * 4 $ I F) K'A 3B4 ˆ2. S @3= $ I X4
*$4/ 2. mm m R ) D' , < E +! 4 '+

n*(n-1)/2 J K9%+%$ $+L+$+ :9 /)!$%0 2 A )MN $+ :9

D 6 &/ K 1 & > I * XX X 8 ,

O/) - )'g-[/Hb

R )g 4 %: ! +4 +! $ I X4 ˆ$3 - Y. $ I 1 >4
R Z X4 -$) +! - ': $ w ]4 $I *hmp m
X4 „ J'87 $ I ƒ X4 e $IŒ X4 , 2E E *$) +4 4 %:!
SA 7 'A $ I $) , '7 5IB “, J J'87 $ I *„ 'A $ I ƒ
* : Z $ , >4 w $8Z J ;)
$3 4 J'87 'A $ I 2Y" X4 < : < E +! +4 <
*$3 . Y - ! < %4 S = $ I </ 54 6 < +4 $3 %3 'A $ I
! S =$' „ J'87 $ I -$ @3 ƒ < '3 2. < : • ;) @3 24 @
*$3 'A $ I </ -$)

1
. Asymmetric
35
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

D 6 K 1 & X" X 8 ,
ˆ2. • ;) </ 'A $ I iE, • ;) -$) ! ?6 D .
R Z b< E X3 :W4 >4 @ *2. S >,6 'A $ I $ 4‚ @3
*$) 24' $ 4‚ T < '
* </ 2 3 2. $ I D . ^4 ' S$ < E 1 24! >4 A@
> 3G $ I Π$ ' *$ F @"' R Z < ! 2 . </ -$ M = .(
*$3 fI6 -$ M = 4 '+ ! $3) ) O

0()* g:/+ I DH=

$33 A - Y . „$ I ƒ -$) n 4 '+ V ?7 Hash 4 . 4 '+


- ^ ' >4 IA *$3 S ?6 „ , O 4ƒ 'J + ! RA
2.$ > 2 4 4 -$ G X4 > X4 Hash ^ X4 D A 2. R ) >4$
*$4/
$3 2, 4 < '3 h- '; D'6 g '6 ) . ^ +4 <
m
*$34': S = -$ G " 7 >4 *$4 A $ ' " 7 < '3 2 QD'6 )
S =- ?6 '+M $) „ Y 8(3 ƒ S = -$ G 2. >4 2. @ M /
S = G' H *$4 A 4 -$ G < A $) +4 S = $ $ Z 7
e : 2. „> ƒ . ^ X4 *$4 A 4 Y S = -$ G $4 2 X4
*hmr m R )g $) IA </ -$ G S = '( > B •

1
. Hash
2
. Message digest
31
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

D L ,Q N % ) * D , N < X` X 8 ,

.hms m R )g $3) )$ < 4 -$ G = x •

N % L ,Q D D @ ,1 Xg X 8 ,

? 3B4 2, : - X4 „ 2%+ Qƒ 'J <' hash ^Z

hfixed lengthg 2 Q- $ ) $ ' A) 1 >4 *2. - <A • ; 4


P% *2. -$) + ! „ , 6 X4ƒ 'J ]4 1 $4 / 2. - X4
- $) n ':< A 2. > A b 4 E hj' B IA g </ digest IJ )
*$3 4 , 8(3 ? digest X4

O/) - )'h):g-[/Hb ! O/) - h):g-[/Hb h/)b'@ / ` [) 5

< E 4 '+ = D'6 *2. -$) S - : E E( 3 >4


2 .< E 4 '+ / 2. A < E 4 '+ ') +! $ '
4 '+ $4/ F= 23 •( Z *$3 3@ 4 '+ $
4 '+ 2 . < E 4 '+ ^Z *$ % 4 < E
'AB RA $) Y: ': < A R >A *$3 @ 23 < E

32
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

Y: (hybrid) 4 '+ 4 '+ >4 *$33 - Y. 4 '+ f


* ')
< E < E 4 '+ $) '7 "' \', 1 5Z .
- . +! D L '6 *$ YI ; $3 Y “? 2
2 . - 4 ') - Y. < E 4 '+ 2. 4 -
! < E X3 $ - 34 R = *$ ') 4 %:! +!
*$ ') ! < E + ! 54 6 @/ , 8 $ I •‡. $ ')
L >4 3 *$4 A .( S V J 4 < $ < E +!
>A4 w X4 4 * : - Y. < E < E f .
- Y. +4 4 </ 4 < E $ I X4 4 4 $34 A Z +4$ 4
+ ! XA w Z Z 4 * $ '7 D . < E +!
7$ -$) - Y . < E $ I 4 X4 w SA •= *$3) < E
* : \', $34/ , “$ 2 4 $ w X4 Z 'J

, , F

2 'A A < 3 A6 4 S!I 1 : $) Y: M 3G


- D 2 3 > AT 54 6 $4 < 3 A6 >4 2. K' >4
</ & 2(J ') +4 $3. 4 Z • I ' 4* : 'J
2(J 5E( B R ,: 'J T 4 @ 54 6 <'3 2. -$33 J
$4 S =- ?6 3. ! Z *2. - ' -$33 J&
>4 3 * @/ & 2(J < ' $. -$33 J • ;) T
>4!+4 " P4 B T X4 2. S Z 3. & 2(J
. ?6 < T 2. T ^Z * •4' 2. T
* ?6 -$3 . , -$ : < 3 A6

K S

': f J g ') S !, S i.' F; >4 -$) n R


*$3 J +! 4 T IA S '. , J h

33
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

i.' ?6 -$3 . , *2. -$) - < % S = X4 D . T $ mt m R )


•‡. *$34': hdigestg -$ G </ $ F J7 hhashg . 4 '+
< A ^Z -$) ! 2 4 >4 *$3 ! 1 '7 J'87 $ I -$ / 2. 2 4
* ') R8 S = 2. -$3 . , T

N % ?1 F Xj X 8 ,

*$ 3 -$ % ! T 3. R S =D. T - ? ml m R )
S = hhashg . ^ 54 6 •= $3 D . & -$) T S = X4 $8Z • /
S = - A - ! '7 J'87 $ I i.' 2 4 >4 •‡. *$3 4 2 4 X4
*$3 D.
2 4 X4 ') 4 %:! • / 'A $ I i.' -$) ! ?6 -$ : 2A.
: * ') 4 2 4 X4 ,4 S = . ^ - Y. > 3MA $4/ 2.
- > -$) D . • / V 6 S = $ < % $3) 4 2 4 >4
*2. ,+ Z H 1'; .

34
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

D < N % ?1 F Xl X 8 ,

R ) *2. -$% +! -$) T @3 . S = ml m R ) $4$4 ':< A


*2. -$) T ! D. R Z S = 3B4 *$ <% R '6 R mq m
4'8 >4 •!" * ') 3. </ T -$) 4 %:! , 4 S = ! $8E
e 3 .

N % ?1 &/ F X# X 8 ,

3
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

B /+f h/)b'@ / " ? 8

*$3 $ ' , 8 < E $ I X4 , 8 $ I $ ' ^ X4 54 6 • / •

2A Z >4 $ 3 2Z *$3 ! , 8 $ I >4 '7 ( $3.


X4 S = 4 %:! $8E & 3B4 *2. -$) - Y . < E +!
*2) $ '7 , 8 < E $ I >4 > ‡
-$) ! $ I >4 *$3 ! & 'A $ I i.' , 8 $I • / •

* ') D . -$ : -$) ! S = 2. V B „ 2 =ƒ
-$ G $ ' hhashg . ^ X4 $3. h• /g -$3 . , 24 @ •

$3 + ! 1 '7 J'87 $ I *$3 $ ' </ hdigestg


*$4/ '"' T
F4 A S = S \', R ) * ') D . & $4 I . >4 " 7 •

< E $ I > 3G ': T < E -$) ! S = R ) *2. -$) -


*$) -$) ! < E 'J

# /+f T [)Y S@ / " ? 8

$I $3 4 %:! 1 '7 J'87 $ I S = S =>,: & •

* / 2. < E
- + ! </ $3. • / 2. , 8 $ I < A E Z < E $ I >4 •

( $3. - 4 %:! S = </ 54 6 $' & •= * '


* / 2.
1'; . - > -$) D . • / • ;) S = ') >ŠAO $4 & D •

'A $ I • / T >4 *2. -$% H


*$4/ 2. IJ S = 2 4 $3 4 %:!
' '- - Y. • / hhashg . ^ <A S = h& g -$ : •
* / 2. -$) 4 %:! S = 2 4 $
< 4“
? : *$3 4E -$ . 2 4 >4 & 24 @ •

</ -$3 . , 2. -$ '" S = H ') >ŠAO ˆ$3)


+4 " S = 4 $) < 4 : *2. - T 1 '7 J'87 $ I
RAB • -$ : 2. - HDE < >4 4 2. -$) - . ,

4
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

*$ <% .3

'" T - Y. R . $) Y: ! F = M/ 3 I '6
e
*2 -$3 . , $) >ŠAO $ ' -$ : ehAuthenticationg 24' $ • •

$= HDE > ?6 $) >ŠAO $ ' -$ : ehIntegrityg 2 A •

') . < +4 i.' 2. > A D E $ D'6 ?6 *2. -


- Y. T 4') >ŠAO -$ . ?6 2(J 34
* 3
*$4 A - T $ ' A -$3 . , ehNonRepudiationg 49= •

(< (CA) , , > / ?1 + 4 (>

U , $ '7 Z Y G $) ': $J ' ! :


4. & 'A $ I $ 3 ’ , *$ ') $@+ 2 34 'A $ I 2. Z
*$ H 24 . >4 ?6 b 'J S S 4'" '. ,* Z 2 34
'A $ I " 1 '7 'A $ I $ + '7 ! ‡ X4 & 'A $ I ^Z
>4 "' $3 T ': $ '" CA ! <'G * 9: &
$I , 24 . >4 — . $33 Z w & $ '7 Z D * ') A H
˜& 2. S 'A $ I >4 34 R, b ˆ$3 2, 4 & 'A

4
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $

(< (CA) , , > / ?1 + 4 (> X$ X 8 ,

</ *$3 D . & ( $3. $8Z • / $3 mo m R )


S = - > S *$3 ! h2. & 'A $ I $3 , • /g S 'A $ I
IJ $3. >4!+4 " '7 IB" R4 , D *$3 4 %:! 1 '7 J'87 $ I -'
*$3
! & BZ 'A $ I IB" R4 , & 'A $ I ‡ RZ S /
$3 S IB" R4 , *$3 4 %:! 2, 4 & *$ . , & $3
*$ Y; & • / $4 Z Y >4 *2. • / ( $3. $3 ,

4
N 8 \\9 5

!"
($ ' "$ % & #
/HY X E H,. RWX \ _)* 89( i =8 ` W* E$8c %;H* " 66# $

' (< I 4A 1 2 .@ I 5* N 895

. 6

4 " ? % . 7. '% 'A $ I 27 . 4 f I I. R8, >4


*2. -$) N 4 % </
*$ F4 A '% 'A $ I 27 . 4 f I. I A) 4 'A
*2. -$) , B 24 '"' >4 X4

' (< I 4A 1 2 .@ I ! " 8 ,

' , , > S&

': 9+ . . ') '% 'A $ I 27 . 4 24 '"' 4


<' Z pm - 4 " > 4/ƒ m - 3. ') >4 *2. : 4 2. 4 '%

45
/HY X E H,. RWX \ _)* 89( i =8 ` W* E$8c %;H* " 66# $

$ I 27 . 4 f I. j™ 2. -$) R % „khkpqt D . &'8 g


* Z '% 'A
e 2 ') >4 P4 _ >4 @ 7
'A $ I 27 . 4 - ' w' <? @. . . •

%4 ! 4 ' $J •

%4 ! ': RAB ' . 2. . . f4'8 •

': 4 " RAB ' . 4 $ . f4'8 •

4 " <': ': - ' 2 B, ' -$33 } 3 A ^" < '3 FE Y4 •

R B -'( 'A $ I 27 . 4 3 ': $J 4 $7 4


4 Y ': " 7 ': $J ! I7 ': $J !
%4 ! ': @. . Y 49=
I NO. +4$ 4 : . R B … Y 2@" - ' 4 IA •

ˆ IIA > NO. - ' 4.

, , - .* /

$4 : P_' : kpqm D . &'8 <' Z qv - j.


>4 ! i 4n $ ^A 2 B, 24 A '3
< . : ~ % @3% = ! >4 > 4/ 3. . *$4 A 4 ;
*$ . < 4 f4'8 qq‰l‰mo u4 @ '% !4 24 4$

*2. -$ / S @G R8, > 4/ >4 R > *k

41
/HY X E H,. RWX \ _)* 89( i =8 ` W* E$8c %;H* " 66# $

.' 1 , , > /

I I. 7. ': $J ! >4 %4 ': $J !


*2. < 4 ?. '@A" ': $J !
r- P $3 f"' -' B.' ! ! >4
') ' f 2. -$) 4 „ <' Z pm - 4 " > 4/ƒ
'A $ I 27 . 4 < 3 A6 OE ^Z $4 A 2 B, ': 9+ . .
mvvq 4' ` mg kpqt‰kv‰km u 4 ! >4 T '7 ': * : &' ( '%
*2. -$) b/ ! >4 A. 2 B, < <A $4 : Jh ?
e $3 ! > 4 P4 _ > 4 @ 7
! 4 < ] E 2 ?J S i4 ) . •

! ': % $J •

! N (J IA < 3 A6 D'8 •

': 4 " RAB ' . 2. . 3. %4 ! IA 5 O < 3 A6 •

%4 !
': $J ! J'87 $ I >A4 $@+ < 3 A6 •
%4
': 24 4$ $J B S A D'Š %4 ': $J !
>4 % ': $J $34/ , 24' $34/ , S 2 Q $34/ , R )
! >4 IA $7 B S A 5 O > AT > 3MA $ I $4$ @/ 'H ':

42
/HY X E H,. RWX \ _)* 89( i =8 ` W* E$8c %;H* " 66# $

. '7 ! ': 2. . 5 O ': $J w' 27 . 4


*2. 2. . </ 2 A]

U =T N < , , > / 5

'6 2. , 8(3 ! h : gS ': $J !


*$4 A < ]E PI ; A ': $7 4 S
': $J ! i.' 2. 4 '"' ': $J !
- 2, 4 ': $7 $J T 4 ' ,: Z$• ' %4
kkg kpqt‰km‰mv u4 h : gS ': $J ! ': *2.
! >4 -$) J %4 ': $J ! i.' h ? mvvq •
! $ .ƒ 4 " RAB ' . 5 O *2. - b/ A. '6 < <A
': 9+ . . ') kpqq‰m‰ko y ' '8 „ ': $J
J'87 F; < 4 % 2. ! >4 J'87 ! $- < '%
*$4 A 4 ': $7 b

43
/HY X E H,. RWX \ _)* 89( i =8 ` W* E$8c %;H* " 66# $

D1 ' >L c =/ 1 B .1 8 = V > > O


S ': $J ! i.' ': I '6
,: < 4 % PI ; - : $3 . "' $ ') J h : g
*$ : E I . . ') Π@/ ': 4 8;% ! 2. -$)
*$ F4 A $3 . >4 I A) 4 'A
7 6 6R r C =. 1> > U
e$ ') E . '7 ': >4
86 @ 6 6R r C > •

4< . X4 + >,: <$ E E • ;) X4 ': >4


S R ) ]E , 8;% ,J ': K' >4 * ') J .' ‰2 )
* : ΠI $ : ' 7S
.@ ^4 ^D ?1 .= . @ = 6 6R r C > •

‰< . X4 , 4 .' ‰2 ) ‰< . X4 Rb ) , ': >4


w' 8;% ]E , 8;% -? ': K' >4 * ') J .' ‰2 )
2A. i n 2 B < '3 .' ‰2 ) ‰< .S R ) .' ‰2 ) ‰< .
* : Π!

44
/HY X E H,. RWX \ _)* 89( i =8 ` W* E$8c %;H* " 66# $

*$ -$) 4 E +4$ 4 ': K' >4 4 D $"


> E1 > O
$J ': D O ': f J 2A. H 'J hk r C >
*$) A $4$" ': 6 6R
>4 2. -$% Π': f J 2A. < . S ': hm
R Z ': ': f J , Z'E 2 8;)
*$) A • ;%

': f J 2A. .' ‰2 ) 4< .S nR hk r C >


': ': f J , Z'E 2 8;) ': .= . @ = 6 6R
*$) • ;% R Z D ?1
54 6 ': 2. S ': f J 2A. H 'J hm .@ ^4 1
': -$) R6 i 4n .' ‰2 ) 4 < . 2. '7 4 d
* : J $4$" 2A. $4$"

7 V 6R r C =. 1> > UW
‰ 2 ) ‰< . 8;% @3 -$) &' ( .' ‰2 )‰< . @ !3 ': >4
* : Π</ Z'E C ;) I . 3) S R Z .'

7 /5N /54C >. u =. 1> > Ut


J !, S Y‹ X4 4 !, 2;. Y‹ X4 34 "' ': >4
*$ : E . '7 $ ')

4
/HY X E H,. RWX \ _)* 89( i =8 ` W* E$8c %;H* " 66# $

D1 ' >L c =/ 1B .1 8= V > > O X " 8,

N< , , > / - A - v 9) 5*
U =T
': *2. -$) E I . . ': V 8 ! >4
b F; 2 w 2 < 6 2. 24 '"' C'8;
w J'87 F; 24 '"' C'8; ': * ') - Y.
': * : Z - Y. ' $7 :- @ .
b F; < 6 S J'87 F; 24 '"'
Y 8;% 4 ': b -+. "' * ') - Y.
7 J -' < 3 A6 NO. 24 '"' + 24 '"' K' ” (
* : Z<
NO. @G '% ': 9+ . . ') '8 5 O 2. n <4)
h NO.g - E hX4 NO.g ! >4 3 2. -$) P4 B ': < 3 A6
*$ -$) 9+ h @G NO.g > ?= h . NO.g ?6
N Q 8 \\9 5

+ # *+ )
,- . /0
B - = 9 >. 1 J VN Q 8 \\9 5

B - = 9 >. 1 J VN Q 895

'A $ I 27 . 4 -' '"' '8 > 'Z I R8, >4


*2. -$) 4 @/ IJ > /^A"

!"#X W 9 , , - D V 5

y' 3) @G 3I I" - 8 2Y - X4 % RA % <' Z >4


u4 f4'8 ?. ') •I % $8 . !@ 4 - $Y
e$) R4 n [ ) <' Z > *2. -$ . < @+ ') $ 4 kpqm‰kv‰mr

'A E zD &
I eD •(
<' Z D'A) AIZ D R8,
?6 >A4 < ./ 2. $ 'Z D'J 'A <' Z >4 zk -
* $4$" 6 . - Y. O.
P4 B S R8,
2. S'@Y 4 ?6 BZ A ehData Messageg hhS =- gg P zm -
1 = 4 - 7n 2, 4 D. $ ' ?6 $4$" 3, ' R4 .
* ')
4 I. hhS =- gg 2. hhS =- gg IJ %3 ehOriginatorg hh .RJ gg z&
RA O. < '3 hhS =- gg C'87 8;) R ) ') D. 4$ ' V 6
*$) $ '; $3
2, 4 hhS =- gg $8Z .RJ 2. 8;) ehAddresseeg hhf6 ; gg zŒ
*$) $ '; $3 RA O. < '3 hhS =- gg w 8;) R ) $3
hhS =- gg Π7 B 3 3B4 ehIncorporation By Referenceg hhS =- K " gg z
* ') &' ( hhS =- gg 4!" <' Z >4 hkqg - 2E O 'J ') PO

1
B - = 9 >. 1 J VN Q 8 \\9 5

H <$ R 24 '"' 2. ehIntegrityg hhS =- 2 A gg |


'6 ?6 F4 A 4 - 7n D . R Z . $8 ) D A *hhS =- gg
*$3 A hhS =- gg 2 A )$7 ') S D'AB
-+ . 'A 4 - + . K' ehComputer systemg hh 4 .gg z
RA hhS =- gg '7 1 = " 54 6 2. !, S z !, 2;. R8
*$3
D. h .RJ g $ ' A . ehInformation systemg hh ?6 .gg z
*2. hhS =- gg 1 = 4 - 7n 2, 4
e 2. ?6 . ehSecure Information systemg hh>ŠAO ?6 .gg z[
*$) ” 'Y( n'Y - Y . '. D'EB '( zk
*$) N (J $8 . . 2I Z 'EB NO. zm
*$) -$) $ . $3 =$ S 2A f. 3 D'EB '( zp
*$) >A4 4 5, ' zr
%3 hhS =- gg 2 Q2(J 5 O 2. 4 ehSecure Methodg hh>A4 4 gg zw
.- 7n 4 '( H 4 O7 ': >,4 u4 > B </ $8E
4 AI $ 4 4 '+ - Y. 2. > A >A4 4 X4 C 7 < X4 hhS =- gg
* ') S % 3A4 \ 6 4 2%: u. = 54$8 1 +! 4 . 3) S Z
4 -$) T 3 2 ? K' ehElectronic Signatureg hh T gg z
- Y. ' hhS =- gg -$33 T 4 . 3) 2. hhS =- gg -$) R8 EO3 '(
* : Z
hSecure/Enhanced/Advanced Electronic Signatureg hh>ŠAO T g z~
*$) <' Z >4 kv - 5O 2. T
$ ' T S E •Z 4 • ;) ehSignatoryg hh-$33 T gg D
*$3
2( 4 . 4 Z'E 4 E E • ;) 2. ehPersong hh• ;)gg S
*< / D 3
D' K] "' ehReasonableness Testg h ?E F 3.g hhD'EB gg <
% ' >,6 > , 6 2 BZ' @ 2 B 6 e IA" hhS =- gg
34!: 34! > , 6 X4 f " 34!: </ @3% = 34!: < ' j .

2
B - = 9 >. 1 J VN Q 8 \\9 5

* ') 4 K' >4 - Y. ' D'AB 1 V @3% =


, RH) 4 !" '3 2. 8;) ehConsumerg hh-$33 V 8 gg j
*$3 S $Z
4 Y3J 2I 3 2. 8;) ehSupplierg hh-$33 > ‚gg zK
*$3 2 B, ,
K' ehMeans Of Distance Communicationg hh - w R4 . gg V
1 , 2@" -$33 V 8 -$33 > ‚ < !A 4! , 'T <$ 2. I.
* ') - Y. $7
> $7 ^" D' Z & 4 ehDistance Contractg hh - $E gg C
*2. - w R4 . - Y. -$33 V 8 -$33 > ‚
$ ' -$33 V 8 </ f"' I4 . 3B4 ehDurable Mediumg hhS i. gg z\
- %, X 4 X 4 =?, R ) IA" $3 - 7n </ 6' hhS =- gg “8;)
*-$33 V 8 2 = 4 2;. X 4
• ;) X4 w' hhS =- gg 3B4 ehPrivate Datag hh 8;) S =- gg z
*> B • ;% hData Subject hh- gg K']' g E E
<' Z Y S'. R8,
> +3 A B.' ] IIA > 2 J'87 $4 % A <' Z >4 Y zp -
* "' 2 • S ! 24 </ '%
> 'Z 4 . j . $4 4 TZ ( <' Z >4 D & S @ 4 ' . ^Z ' zr -
*$34 A TZ <' Z >4 Π$3 ' D'8, &'G @G 24 ']'
J'87 Z S @G R8,
Z 5, ' S =- 1 = 4 - 7n 2, 4 D. $ ' H ': zs -
*2. B > , 6C7
hhS =- gg S S •(
RJ T )' z
+ 2. )' hhS =- gg $) S <' Z )' X4 '" - : zt -
e4 '
*D'E3 b D' 2 3. P
* 4 @ < :$33 V 8 4 ' 1 , &

3
B - = 9 >. 1 J VN Q 8 \\9 5

$3 J - Y. J 7 '. @% 4 $% O7 S? zŒ
*$3 ^3 RB, ~ 4 RB, 'J J7 1 : 4
*2. Y T $$ S T '" <' Z - : zl -
4 >4 ') $@+ 4 4 RJ 'J ?6 $$ S <' Z - : zq -
e$) 49=< 4 i4 ) '" 'J ! S =- 'J ?6 4 $@+
*$) , $B K'" 'J - Y. < -' . . R Z ' ?6 P
“E Z Z 4 -$) 2, 4 4 D. $ ' h ,g Z<A S =- &
* ') $@+ -$) 2, 4 4 D. $ ' $) ?6 +%4 A
! $3) S =- 2, 4 < D. < $8E $ -$33 • ;% ?6 Œ
*$ ') $@+ '" 'J
$@+ C'87 ; 4 -+. < . @ +4 i4 ) z
*$) -$) , - 'A E '7 2 'Š - ' i S =-
, 4 A 7 hhS =- gg D . > B BOE $4/ '" O4 ) - : zo -
'6 $4 ') J i4 ) >4 2( 9b $3. ') </ >4!+4 " 9b 3. - Y.
Q hhS =- gg " 9b 3. 34!+4 " *$3 S? hhS =- gg D 7 N4 J
*2) $ '; > , 6 I Z $@B \'E
>ŠAO hhS =- ggz S'. • (
>ŠAO E . T zD R8,
e$) 4 i4 ) $4 >ŠAO T zkv -
*$) , 8(3 -$33 T 2 zP
*$4 A S'IB hhS =- gg -$33 T 24' z&
*$) -$) J 8( - 2( 4 -$33 T I. zŒ
• ;% R Z hhS =- gg </ H ') R8 hhS =- gg X4 '( z
*$) P%
X4 i4 ) 24 2. hhS =- gg >ŠAO E . zkk -
*2. ~ R Z j . S ! S +3 -$) - 7n >ŠAO ?6 .
>ŠAO T E . Q/ Q1 1 49= zS R8,
- 4 A ( x - ' S =- 'J 2. > A ' Q 3. zkm -
</ f Z R ) R “, J hhS =- gg Q1 '"' $ 'Z j . <' A

4
B - = 9 >. 1 J VN Q 8 \\9 5

*
f. 3 IA" 3ŠAO R ' "' hhS =- gg Q1 I '6 zkp -
* ') > B hhS =- gg '3 K']' -$) , : 3A4 1
4' ( • $ -$) $@+ 4 >ŠAO 54 6 4 hhS =- gg I zkr -
'ZSE •Z J ;) I - $@B ,6 4>,6 $@B </ Œ $3 T
^" 3. R Z B 3. Q/ 4 . </ Y " $ ') &' ( < /
*2. Z'E 4 TZ
>ŠAO 5 '. >ŠAO 5 '. >ŠAO hhS =- gg 2 zks -
hhS =- gg 2 IB" <' @3 2 K'A $4 >ŠAO T
*2. - , 'Z @" @" '! hhS =- gg 'A 2 Q 4 '!
2 Q<' Z >4 hkkg - i4 ) 5 O • Q• ;) i.' hhS =- gg zkt -
*2. 2(J < E ') $@+
hhS =- gg S @G • (
>, 6- $E hhS =- gg K" 'Z D R8,
e2. B 4 ' 24 hhS =- K " gg zkl -
* ') > B hhS =- gg N4 J '6 K" ' P
*$) • ;% >) $3 </ R E V 6 K" ' &
*$) V 6 D' Z ' K " K']' hhS =- gg zŒ
hhS =- gg & S R8,
*2. .RJ &' 3 hhS =- gg 4 ' zkq -
>4 .RJ f " $) -$) D . 8;) I . 4 .RJ i.' : P
*2. - '
D. .RJ f " '7 $8 4 -$) !4 ?6 . I. : &
* ')
</ 5 f6 ; ') D. 4 w ) 4j. hhS =- gg zko -
e$4 A RA h-$) D . g ] , > 3G 5 O - &' ( -$) D .
hhS =- gg 4/ $3 S'IB $) -$) 5, ' 4 ,B ) .RJ I . “? Z P
*2. - D. .RJ 2. < A
1 O -$) ) 8;) $Z f6 ; i.' -$) 2, 4 hhS =- gg &
B - = 9 >. 1 J VN Q 8 \\9 5

,4 . . .RJ - Y . ' 1 ' 9 • ;) -$) • < :$34 A 4 .RJ


*$. 3% '7 hhS =- gg L hhS =- gg
4 $) -$% J .RJ S = 2 ' R ) <' Z >4 hkog - zmv -
*$) -$) J - ) '6
S'IB </ + : &' ( RE ! hhS =- gg X4 hhS =- gg zmk -
*2. hhS =- gg $ ; hhS =- gg </ $)
2, 4 54$8 zS'. R8,
$33 5, ' 4 $ '; f6 ; .RJ hhS =- gg D . S +3 4RZ-: zmm -
w K' $) -$% 5, ' 54$8 1 4R ) : ') 54$8 hhS =- gg 2, 4
2, 4 D'EB '( .RJ f6 ; '. f. 3 $ K' n; 4 4 '7
* : &' ( hhS =- gg 2, 4 54$8 $3 >ŠAO hhS =- gg
2, 4 54$8 w % S =- Z'E Q ': N4 J '6 .RJ : zmp -
* ') 2, 4 </ 54$8 </ + ') EI -$% D . S =- $) - S =-
*2 \ J S =- '( ^" S =- 2, 4 - zmr -
1 4 $ . 3, ! 5 O S =- ') $ Z 54$8 +3 zms -
*$ -$) 24 ! </ 2. >4 ’ , -$) 2, 4 > , 6 5, ' '
S =- 2, 4 D. < < S @G R8,
D 3 Π7 ?6 . X4 $ 4 5E( S =- D . zmt -
* ') SE •Z 4 .RJ
e ' $ '7 4 i4 ) 5 O S =- 2, 4 < zml -
5E( 2, 4 $) -$) > B S =- 2, 4 f6 ; ?6 . : zP
e ')
4 ˆ ') -$) > B ?6 . S =- zk
>B >4 “8(3 A . b f6 ; ?6 . S =- M 3G zm
* ') 2, 4 S =- ') -$)
5E( 2, 4 $) - > B 2, 4 ?6 . X4 f6 ; : &
* ') f6 ; ?6 . S =- ')
*2. " ?6 . E . R( "' < $ <' Z >4 hmlg - Y zmq -
$) PI ; S =- 2, 4 E . R( ?6 . E . R( : zmo -
B - = 9 >. 1 J VN Q 8 \\9 5

e ') RA 4 -$ Z 5 O
f6 ; 4 R( 2. S =- D . R( .RJ 4 R( P
*$) -$) 5, ' </ V ?7 </ + 2. S =- 2, 4 R(
I B RJ R( >4 4 ! $) ) 4 R( X4 F .RJ : &
*2. 4 R( 2 ) IJ R( '834 b ' $ '7 4 R(
$ '7 ~? < / ' Z - + Z $3) 4 R( $Z , f6 ; 4 .RJ : zŒ
*'
S =- 2, 4 D. < < 54$8 2, 4 & •= Z'E Q/ zpv -
'A $ 'Z ^ S =- ' ( > 3MA <' Z >4 S @G • ( S @G S D'8, K']'
*2.

hCertification service providerg ': $J $7 , S &


$J $7 • $3 •$ ': $J $7 , zpk -
$ 4 D . - 7n $J $ ' R ) $7 >4 *$ ') •. '% T
*$) h T g2 J ': $@+ DO
24 4$ < . i.' , >4 P4 _ [ ) •. S i '] > 4/ zpm -
4 8Z ' ?6 3, 6 : ; '% !4
*$ . $ '7 < 4 f4'8 @ :

PI ; $ 'Z S'. &


8( 24 A D •(
hConsumer Protctiong -$33 V 8 24 A eD R8,
: A8 Q' ?6 4 $7 < :$3 • < :$3) , zpp -
< :$33 V 8 7 $E RZ .3 < i4 ) D' Z 4 $4 7 2@" < :$33 V 8
e$) 4 ' R ) S ?6 RZ $ *$3 Z
* $7 4 :W4 3, 8;% P
* % $) D'H% 2 B, S </ 2( S -$33 > 24' z&
</ 4 'J % ) 4 >YI - A) 2 = j / zŒ
*$3 Z w -$3) , 54 6
B - = 9 >. 1 J VN Q 8 \\9 5

4 2A Z IA" g ' $ '7 % -$@ $4 7 • 34! I z


hj A 34! RA 34! <! $7
*$) B -$) • @3% = $ z-
$7 K " u , " 4 R4'( 27 = -'( f IA" $E $34/ , i4 ) z
*1 , •=
D. 4 ?6 $E ?6 $ 4 >A] : $" '6 $4 -$33 > zpr -
e$4 A
* A 24 ) -$33 > 4 R( j / P
*1 , •= %= 2 A] ^" ?6 &
*<' Z >4 hpqg hplg ' f"' I B u , : , i4 ) Œ
* $7 S Z u , i4 ) z
S O. $4 -$33 V 8 ? ?6 4$ 4 ? ?6 zps -
S ! j. >B $ 6 f. 3 R4 . f. 3 < - ' N4 J >)
* ') • < ' <' , 24 ] IA" ? B 2 >
jA 4 $8Z -$33 > 24' 'J w - Y. 'J zpt -
* ') < A K ) N4 J >) '6 $4 -$33 V 8
V 8 2Z 2Y RZ $ $4 -$33 V 8 - I B zpl -
I A( 34! @3 *$) ) R • 4 A4 " RA( < $ '7 D' Z hV 8 5 g
e ' $ '7 < . , •= 34! -$33 V 8
e ' $ '7 4 f V 8 5 D A K ) zpq -
$7 1 , 'J -$33 V 8 I u4 1 , 'J P
* EB
' $ '7 ?6 • •= -$33 V 8 V 8 5 D A b/ D &
*2. </ • P_' <' Z >4 hprg hppg ' 5 6 -$33 >
x O < $ 2. PI -$33 > V 8 5 -$33 V 8 - Y . ‘ ( zŒ
*$4 A -$33 V 8 2Z K . , 4 dI > @" ':
" 2. $7 K' J 7 i4 ) ' -$33 V 8 V 8 5 z
*$ / $ '7 <' Z >4 hlog - 2. > 4/ f"' </ ' *$) $ ';
< S$ 4 '"' S$ R I B > -$33 > 'J zpo -
B - = 9 >. 1 J VN Q 8 \\9 5

+ $ : f6 ; “', , 4 dI $4 $ S '7 $@B $ ' $7 "


< J - / f6 ; $) > A b $@B , %A $@B I ^
< S$ $ -$33 > ') S'IB 'J *$) $@B Y4 4 R4'( <
>4 E L$ ,4 dI . S! -? * '7 $@B Y4
*$) $ '7 S' ( ! < ' Z
- -$ -$33 V 8 M/ % $7 4 $' -$33 > zrv -
*$) - S? </ I B S > 4 I B RZ </ w % $4 A • 4 R4'(
$@B 4 I B K']' b +4 $7 4 -$33 > 'J zrk -
*2. -$33 > -$@ K" 34! ') - K" $7 4 $4 A D . f6 ;
' -$33 > '. +4 $@B 4 I B X4 < '3 M 3G ' 9 . $7 4
*$3 D' Z </ $ ' f6 ; : Z& 4
e$) $ '; " 4 ' R8, >4 24 A zrm -
<' Z >4 hlog - 2. > 4/ f"' </ 2. @, $7 P
*$ / $ '7
!" D'E3 b D' ) 2 \'E 4 D'E3 bD' 1 , ^" ? B z&
*- "
* $7 E 1 , >) $4 7 zŒ
* " ^" ? B z
*$3 24 ] RA -$33 V 8 ' . $4 -$33 > zrp -
* $3 '7 :$ . •T Z ^" $4 4 V? 7 ' zrr -
24 A > 'Z 4 . j . $4 <' Z >4 f"' -$33 V 8 \'E " zrs -
* ') PZ' $33 DA P B]
b w ) D A > 3MA R8, >4 E V ?7 Zw ) - Y . zrt -
*2 Q' -$33 V 8 ] Y83
w R•. b ) I B K']' F; </ - ? B zrl -
* ' $ '; <' Z >4 E D'A% ') S -
) < '3 $3 ' -$33 V 8 \'E 24 A $ 'Z < . zrq -
: @3% = ' $ '7 > 4/ f"' </ f *$34 A ' Z
*$) < 4 f4'8
B - = 9 >. 1 J VN Q 8 \\9 5

> 'Z f"' 27 = R4 . - Y. < -$33 V 8 \'E zro -


*$) $ '7 4 -$) f4'8 i n ' Z ^" i.' 2. E
hMarketingg d I $ 'Z S R8,
$ ') IB, ~ 4 RB, f $4 '7 $7 dI < :$33 > zsv -
* ') 2 Y 2A • f6 ; f4 , 4 <$) % f.
, ?. $4 $33 dI '7 $7 1 , :$33 > zsk -
*$ $ O7
>) N (J 5 Z '6 -$33 V 8 $3 d I '( $4 -$33 > zsm -
*$3 ~ $7 w' ?6
>) 2. ^Y HI +3 4 • ;) 24' $4 4 HI zsp -
*$) N4 J
Y; 2@" 1 ? B -W4 J'87 $4 < :$33 > zsr -
*$33 - Y . '. '7 f R( 4 24' w' 54 E < 'A
^" < / $ + < :$33 V 8 $ @A $4 < :$33 > zss -
*$ + A8 '7 2 = 4 = % H I 2, 4
*$34 A RA , 4 5 O $4 HI < :$33 > zst -
*$ / $ '7 <' Z >4 hlog - 2. > 4/ f"' </ i ']
2. > 4/ f"' ' Z >. 4 < '"' < ' 4 d I zsl -
*$ / $ '7 <' Z >4 hlog -
hData Protection z- 24 A g 8;) S =- 24 A S'. R8,
W 4 'Z %4 > 8;) S =- ^4 ' 4 1 = - 7n zsq -
4 A " 2 B] ^" S =- Z?7 J'87 9 $E - :$4
*2. ' Z b < '3 @/ N4 J 24 ] < $ C ;) 3"
5, S =- '( /w) ! S =- K']' • ;) 24 ] 'J zso -
8;) S =- ^4 ' 1 = - 7n $) ?. ') •I &'8 > 'Z
e 49= 'J 4 i4 ) ” ( $4
*$3) -$) - [ ) N] '6 - ' • ;% </ V $ zP
• ;) /^A" S +3 ,$ f. 3 ]- $ @3 $4 S =- z&
Z - Y. ' -$) > B V $ @3 : /^A" -$) - [ ) S =- K']'

5
B - = 9 >. 1 J VN Q 8 \\9 5

* :
*$) $ / N (J $4 S =- zŒ
'7 w' 8;) S =- 4 -$ = $4 S =- K']' • ;) z
*$3 [?J 4 '( 2. 4 • Z S =- $' ) . .
R '( 2. '7 6' i '] 24 < $ ' $4 S =- K']' • ;) z-
*$4 A3 '7 w' 8;) S =- 4 -$ =
^ ) $@ )!= 5 '. w' S =- ^4 ' 4 1 = - 7n ztv -
*$ / $ '7 <' Z >4 hlog - 2. > 4/
</ %, •3L . R Z S =- K']' . . ^" ' 4 . ztk -
S =- <4" D 3 $4 D ' @ 3A4 : , ’ • Q C ;)
* ' $ '7 6' > 4/ <' Z >4 S @G & Π$3 ' f"' 8;)
S =- 2_ Y S •(
hAuthor,s Right/Copyrightg P ' \'E 24 A D R8,
< Y' \'E <' Z 24 A 2( Q/ h % ] g ^4 ' " L 5 ztm -
&'8 'J Q/ 4% f L A" <' Z kprq‰o‰p &'8 < $3 3 < Y38
kplo‰kv‰r &'8 4 !, S < :$ / $4$= \'E 24 A <' Z kpsm‰o‰mt
$3) S =- fZ Y Q/ I *2. P ' 7 “8(3 S =- 'J
> 3MA - - +4 = 4 1 ! 4 !, S ?6 IA"
5 65 K 7 5 R ) , 2 \'E 24 A
G ‡4 $ %E 24 A - - +4 = 24 A P' 5 i \'E P'
' 9 > 'Z D'A% . 24 A hIntegrated Circuits & Chipsg BOZ
2 Q<' Z " ?J > 4/ kpkv‰r‰k &'8 7 •? 2 Q<' Z - >4
<' Z </ '9 ' </ w'3 ' $ '7kppl‰r‰kr &'8 7 •?
*$) ?. ') •I '8 5, '
< '3 >4 F= hRelated Rightsg 3 2 i \'E zk - 8
\'E R ) $ $) 7 3) hNeighboring Rightg 3 2 " \'E
< :$33 $ ' Q/ < $3 3 \'E IA" P' -? +4 J3 '3B
&'8 > 'Z D'A% $3) F;= i ] .' < . 4'8 'J (YJ
*$3) - >4 - ) ' kpsm‰o‰mt kprq‰o‰p

1
B - = 9 >. 1 J VN Q 8 \\9 5

2. C 7 EO3 %E !" X4 hIntegrated Circuitg G ‡ 4 $ zm - 8


*2. V B !" 4 $B 34!+4 " 2 I Z </ • IA
&'8 7 •? 2 Q <' Z j . $ >4 5O3 •A " %E 6
24 A ' kppl‰r‰kr &'8 7 •? 2 Q <' Z " > 4/ kpkv‰r‰k
*$)
S =- 1 = 3, : , XY34 !" Q ^4 ' " L 2Z' D A ztp -
*2. Π7 \', - E D'A) 2. )
hTrade Secretsg . 24 A S R8,
R 8( K % 2Z 24 A '3 ztr-
• QC ;) </ %, 4 '7 .' - +3 8Z . 'Z b
*$ . $ '7 <' Z >4 E f &' ( S " i(
'+ D' , ?6 R ) 2. S =- . zts -
S 1 -$% %3 Y $34/ , X3 1 ! !, S
[ 6 < 4 % 2. @, ?6 : , %E <'3, $ .
$ Z S'A j . -' 8Z 1 RE '6 2. @34 D L
*2. -$) @/ 2. …Y 'EB 1?
hTrade Namesg •? 24 A S'. R8,
K % 2 Z 54'% < :$33 V 8 \'E 24 A '3 ztt -
i7 F4 A K' 4 hDomain Nameg 3 S 'J •? - Y.
K'3A ') $7 2 J V 6 <$) % 4 f4 , f"' •? hOnlineg
*$ . $ '7 <' Z >4 E PI;

4 " S @G &
'‡ ? zD • (
b - Y. 4 - Y . '. • ztl -
'( B, & - w R4 . 4 . S =-
f. 4 $4Y < +4 - b 4 . 4 IA I7 $ S =- PZ'
D ' -'" +4 4 '7 54 6 >4 ') </ 4 '7 1 = . A:
< J D -? &' ( S < +4 D ' $3 R 8( 4

2
B - = 9 >. 1 J VN Q 8 \\9 5

* ') S' ( -n'7 D D B $E !" 27 = D . . X4 • D'


- >4 E RZ $ </ &' ( S " ! S " >4 K ) z- 8
*$)
' ‡ RB" S • (
S =- PZ' '( H 54 6 • ztq -
. R4 . - Y. 4 4 . S =- 1 = I7 $
E . $Z , T $ ' 4 -$33 T ' <$ J 8 7 $ I RL T $ ' +!
'! 2. @, -$ S R4 . </ \ O S$ 4 3. , 2. @, 2Q
• $4 A Q 1 S =- RB" S $Z </ 4 D'B ': 97
&' ( R " $4 A - Y . B S =- < '3 - b •T Z ^" </
hsv‰vvv‰vvvg <' I - 3= < ! $E !" 27 = D . . X4 •
* ') S' ( D 4
*$) - >4 RZ $ S " >4 K ) z- 8
8( \'E ‘ E S'. • (
d I $ 'Z -$33 V 8 \'E ‘ E D R8,
- <' Z >4 hplg hptg hpsg hprg hppg ' PI; -$33 > zto -
*$) $ '7 S' ( D 4 hsv‰vvv‰vvvg <' I - 3= D 4 hkv‰vvv‰vvvg <' I
*$) $ '7 S' ( L$ hplg - PI; -$33 > z- 8
<' Z >4 hssg hsrg hspg hsmg hskg hsvg hpog ' PI; -$33 > zlv -
$ '7 S' ( D 4 hkvv‰vvv‰vvvg <' I $8 4 D 4 hmv‰vvv‰vvvg <' I 2
*$)
S' ( - >4 L$ <' Z >4 hskg - PI; -$33 > zk - 8
*$) $ '7
S' ( - >4 RZ $ <' Z >4 hssg - PI; -$33 > zm - 8
*$) $ '7
- 24 A ‰ 8;) S =- 24 A ‘ E S R8,
<' Z >4 hsog hsqg ' E i4 ) • zlk -
* ') S' ( • D . . X4 &' ( S $4 A ‘ E
': $J $7 , i.' 8;) S =- ^" 4 " -: zlm -

3
B - = 9 >. 1 J VN Q 8 \\9 5

>4 hlkg - E L$ f $ 4& D' @ 4.


*$) $ '7 S' ( <' Z
4 " ': $J $7 , 6 O. : zlp -
$E !" 27 = • D . X4 - . f $ 8;) S =- ^"
* ') S' ( D 4 hsv‰vvv‰vvvg <' I - 3= D B
S =- 2_ Y ‘ E S @G • (
P' 5 ‘ E D R8,
' h% ] g ^4 ' " L • zlr -
f L A" <' Z kprq‰o‰p &'8 < $3 3 < Y38 < Y' \'E 24 A <' Z
!, S < :$ /$4$= \'E 24 A <' Z kpsm‰o‰mt &'8 'J Q/ 4%
?. ') •I '8 5 6 ' 9 ' / w'3 kplo‰kv‰r &'8 4
D . X4 - . $4 A ‘ E < Y' -$) N4 8 5 'J ') - A)
*$) $ '7 S' ( D 4 hsv‰vvv‰vvvg <' I - 3= < ! $E !" •
.‘ E S R8,
' 3 • <' Z >4 htrg - > YI; zls -
\'E • E $7 8Z B3J - +3 7 4 2BY3 2 Z
< / . b . 4 IH) . %, S$ 3 S $; . Z
!" D. - F) • $4 A %, • QC ;) 4 - 'A R 8( '7
*$) $ '7 S' ( D 4 hsv‰vvv‰vvvg <' I - 3= D B $E
4? ‘ E S'. R8,
2 $E !" • D. . X4 <' Z >4 httg - < YI; zlt -
*$) $3 '7 S' ( D 4 hkvv‰vvv‰vvvg <' I $8 4 D 4 hmv‰vvv‰vvvg <' I
4 . S @G R8,
A 1 4 !" 2 ?J w' E . > 4/ 4 " 4 . zll -
* ' $ '7 <' Z f"' i 4 !" 4 T Z IIA >

7< " 3= &


C'87 .‹ . PB] 4 • E Q -: zlq -
'! .‹ * ') C ;) 7 w 4! , ^OZ !"

4
B - = 9 >. 1 J VN Q 8 \\9 5

$) , 8;) RB, ) - 7 34 + $3) - 7< "D‹


* ' $ '7 C ;) >4 -$@ 7< " 'J >4

ZY %) &
>4 " i 3 2. P_' : zlo -
. '7 ?6 3, ') $ 4‚ @3% = • - •. 3) $3) Q‹ <' Z
> 4/ >4 * ') i n @ i.' <' Z >4 > 4/ 6' E >4 $
- ) ' > 4/ 4 . *$ / $3 '7 " I < 4 f4'8 •= E
*$) $3 '7 @ R4n f <' Z >4
' : ; @3% = <' Z >4 hrmg hpqg ' w' > 4/ P
@< 4 ?. '@A" ! X '% !4 24 4$ < . 4 8Z
*$ . $ '7 < 4 f4'8
: ; @3% = <' Z >4 hslg hstg ' w' > 4/ &
$ '7 < 4 f4'8 @ '% !4 24 4$ < . ?. ) }3 ,
*$ .
1 '/ < 2) $@ @3% = <' Z >4 htvg - w' > 4/ Œ
*$ . $ '7 < 4 f4'8 @ '% !4 24 4$ < . )!=
2 B, 24 A '3 2. P_' : zqv -
! >4 > 4/ 3. . *$4 A 4 ; >4 ! i n $ ^A
f4'8 @ '% !4 24 4$ < . : ~ % @3% =
*$ . $ '7 < 4
7 S =- I < :$33 V 8 < +4 > 6 ; < .RJ zqk -
' %= - 'A $@+ E4 6 $ '7 2 ' 2( • S =- $3Y_' $
*$ A <'8 +4 ; ; X4 O7 ': 'J $34 A @ hBack upg
B - = 9 >. 1 J VN Q 8 \\9 5

, , - D V U"XT L 1 + . 1 5

: ; ~ % @3% = 3 kpqt‰vt‰kk y ' I" < 4 ‚


!4 2 B : 4 8Z ' ?6 3, 6
> 4/ zkpqm &'8 z <' Z hpmg - 3. '@A" • 4
e 'A f4'8 4 [ ) -$) 4 - 4 "
kpqm &'8 z <' Z hpmg - 4 " > 4/
e$ w' [ % 3B 4 ?OJ > 4/ >4 zk -
zkpqm &'8 z <' Z e<' Z zP
* > 4/ >4 hmg - K']' ': 9:2. . ') e ') z&
* > 4/ >4 hrg - hP g $3 K']' %4 ': $J ! e %4 ! z–
> 4/ >4 hrg - h&g $3 K']' ': $J ! e ! z
*2.
* > 4/ >4 hrg - h–g $3 K']' ': S 2 Q , eS 2 Q , z{
X ': -$33 J! ' ?6 - e ': zŒ
-$) $ ' ! i.' D 4 . - A) X4 X 'A $ I TE $J u4 ':
*$3 A </ X 'A $ I > w 2(J $' 8; ) ':
-$33 T J'87 $ I 4 ! 8( - e T 4 - z•
*$3 - Y . </ T 4
2(J . 'A $ I 4 ! - e T . - z[
* : Z - Y. ' T
i 'A $ I J'87 $ I e T . 4 - 4 $ I Πzy
*< E + ! X4 </
*$3 A ': ?6 2. 8;) e-$33 A V 6z
-$) J ! I. T X4 R ) ? e @ zn
*2. -$) 4 J 7 ^Z' > B S =- $3 $4
2@" @/ w' ?6 ': % - 7n - - +4 = X4 e<!; z
*2. -$33 A V 6 -@
" '3 !, 2;. 4 !, S e T . 4 !@ z
* ') - Y. T . 4 w' -
B - = 9 >. 1 J VN Q 8 \\9 5

> 'Z 2. . RA % ': 2. . 'A e ': 2. . z`


-$) >4 $ IIA > $ . 5 O 7. Z'E 3, 1 E
V 6 T < J S 2Q , ': $J ! .- = ! . '7 RZ $
2. ! %4 ! ': 2. . >4 >4 $ *$3 • ;% -$33 A
* : 3 : $" '6 ! $'
2@" ': 2. . 5 O3 4 RAB ' . 'A e ': RAB ' . zj
* : >4 $ ! %4 ! ': 24 4$ IA •!" N4 %
$34/ , 2. . !, 2;. !, S 'A e 'A $ I 27 . 4 z1
* $I Π': 24 4$ ' D
'% 'A $ I 27 . 4 - ' 9:2. . +G ‡ 4 … Y '3 zm -
e ') R % 4 T f ': 9:2. . ')
h• 4 g i n< B 4 : 4 zP
: 4 i n < B z&
?6 4 i n < B z–
?6 3, 6 4 i n< B z
4 8Z ' 4 i n < B z{
)!= 1 ' / < 2) $@ 4 i n < B zŒ
'@A" • 4 !4 2 B i n < B z•
< 4 ?. '@A" ! X R •4 i n < B z[
< 4< B ^4 3J : \ • 4 zy
'% ~? 3. 2 Q< .•4 z
4 Y3J S < . • 4 zn
X 'Y ') z
?6 3, ') z
h 5 < $ g ') < '3 B.' ! • 4 z`
') T 4 . 24 L $ 4‚ • 4 @3% = - 7 % Y . X4 zj
e ') > B 4 [) ') P4 _ zp -
4 '% 'A $ I 27 . 4 - ' w' <? 2. . . zP
f4'8 2@" '% ?6 3, ') </
B - = 9 >. 1 J VN Q 8 \\9 5

%4 ! 4 ' $J z&
%4 ! ': RAB ' . 2. . . f4'8 z–
': 4 " RAB ' . 4 $ . f4'8 z
4 " <': ': - ' 2 B, ' -$33 } 3 A ^" < '3 FE Y4 z{
': $J ! R B -'( 'A $ I 27 . 4 3 ': $J 4 $7 4
%4 ': 2. . Y 49= 4 Y ': " 7 ': $J ! I7

'J %4 ! A YI; IA 1 !: . zŒ
* @/ ' 'H S !
4 < '3 <' Z hpkg - K']' ': $J $7 , ['O. zr -
e$ ') > B 4 [) ': $7 < :$3
*$4 A 2 B, ') ' f %4 ': $J ! zP
*$) <' Z hqvg - K']' B.' ! ! >4 zk - 8
4 RE %4 ! S -' ') ' 97 $' . zm - 8
- >4 K']' B.' ! -$) 4 ! 'J >4 $4 A
* ' $ ';
%4 ! X4 ' f ': $J ! z&
*$ S T w' $7 4 . - 'A ': $J
2Q 2 ! X4 RZ $ ' f ': S 2 Q , z–
5 O @/ w' ' 4. ': 'H ': $J C'87 < ] E 2. '7 D E
S $Z 2. - 'A T @/ A $@B ! '. - J RAB ' . i ']
*$4 A
e$ ') > B 4 [) %4 ! 2 'Š P4 _ zs -
f4'8 2@" ') 4 %4 ! ': RAB ' . 2. . @3% = zP
') RAB ' . 2. . " z&
! RAB ' . 2. . f4'8 . z
@/ ' $J 4 < ] E 2 ?J S i4 ) . z
$ ') ~ $ $@+ ': f. 3 B ?6 2 Q < 3 A6 D'8 z{
?6 >4 2(J D
B - = 9 >. 1 J VN Q 8 \\9 5

! N (J IA < 3 A6 D'8 zŒ
$- RA < % $@B V ?7 ! ': D O z•
H ': ' -$33 A V 6 T < J . K?6 z[
!
</ $7 . K?6 i7 <!; X4 . 4 zy
f"' ! >4 2 B, ! IA ^OZ ‘ ( %4 ! zt -
$4 ! ' 'H 'J > 3MA ') PZ' +4 R 4 4 T Z ^"
< 4 ?. '@A" A. Π> 4/ >4 hsg - hyg $3 Π$3 1
*$4 A % 3 -$) R6 ': 2. @,
! DO ) <4 ] 2 7 27 = -'( 2 'Š z- 8
': RAB ' . $4 S 2 Q , 4 ! >4 -$) J T < J
*$) -$) $ Z > , 6 > -$) $EB3 Z 4 !
$ ') 4 b F; 4 - + . i.' ' f ! zl -
e ') > B 4 [) ! • .‚ i '] i4 )
i n ^" 2Q' 4 3. . 4 zP
]E V 6 ] E 4 z&
E E( S'I ; $ 4‚ ' i I 8( ~ $ Y c3= , B z–
e 4 i4 ) )!= 1 ' / < 2) $@ 3,
*i 2 B, “( " +% I 8( ~ $ j 3) Y . zk
. RZ $ 4 6 ?6 3, i ) ~$ Y zm
) '/ - 6 ' - A 6 ?6 3, i -' D.
* , 3, !
-$) S? S !, S !, 2;. !@ - A f. 3 4! , < > ‚z
! <. $ 4‚ ' $4 A > AT +! 3, 2 3 '( %4 ! '.
*$) ,: Z %4
* %4 ! i.' -$) > B dI f. 3 B > AT 4 z{
*! ': RAB ' . 2. . >4 $ zŒ
< ]E S $Z ] E . 2 - V _ $3YI %4 ! zk - 8
*$34 A S?
B - = 9 >. 1 J VN Q 8 \\9 5

$3 '7 2 B, Y b 'J @ . i.' -$) 4 ! zm - 8


* 'A
': $7 4 kpqq D . $ ! zp - 8
*$3) A '7 2 B, - ' Π7 b F;
$34 A 97 - >4 i4 ) ? ! $- ' J ;) zr - 8
'J >4 b *$34 A S $Z ! • .‚ 2 ' $J u4 - F) V _ $3YI
* : EI -$) 'H < %4 '
-$@ 4 P4 _ ': RAB ' . Y 24 2 B, > ! zq -
e2) $3 '7
*i nS 2Q , ' $J 2 ?J . zP
*>ŠAO 'J ': 'H $J $7 4 > AT z&
*>ŠAO ^4 . 'J ': 2(J $ 4‚ $7 4 > AT z–
:'I" - >4 4 $34/ , T w' - < ' ( > AT z
* ': . )
e4 ' 2 < 3 A6 D'8 z{
*$3) N (J ': Π$3 ?6 ': $J ( zk
4 - ': -$) • ;% -$33 T ': $J S +3 zm
8( D 3 2( T 4 - - 'A 2, 4 T .
*$)
': RAB ' . -$) > B < $ ': i ?6 I zp
*$4 A … Y 'J
*$) • ;% R Z -$) > B 2Z ': X4 'H $J 2 . u4 zr
*$4 A > AT < ]E T 4- - 7n 4 ‡ S$ zs
'7 24 ] ': < J ' !" $) S'A . . R Z ': zt
*$4 A & 4 'A % ': K' 4 $ - S?
- @ X4 S 2 Q , 2. '7 2, 4 ! < 'J zl
* ') A A]
J ! </ i.' 4 ': . @, 2. P_' ! zk - 8
$4 '! ?6 *$4 A % 3 @ ': K' ': f J S $J u4 n ')

5
B - = 9 >. 1 J VN Q 8 \\9 5

* : Πw' 34 - +4 "
'J ) '7 ZV 6S 2Q , IA ! zm - 8
-$) 3 F = $ @A 24 S! 'J - '7 </ i '] 5 6 PI;
* 'A $ '7 S $Z PI; S 2 Q , ' 'H 2 ': RAB ' .
i4 ) ? ': 2. . 5 O '6 ! ' zo -
$4$A R Z %4 ! i.' < ] E 2 ?J $ •= $4$" 3, '(
*$)
> 4/ >4 E i4 ) ? %4 ! $ 4‚ “, J ! ' zkv -
* '$ '7 b 9: R Z ': RAB ' .
< $ '7 I7 2 B, - ' $3 ' b 4 .‹ I zkk -
J 'J >4 4 ': *$34 A ': $J 2Q %4 ! ' 97
$ 4‚ ': >4 I . 4 T -' > 4/ >4 E D'A) Œ 7 ')
* ' $ '7 .‹ < A - Y . R Z “, J <' Z hkvg - K']' Œ 7 $ ')
4 Z'E 4 E E C ;) i.' ' 3 $3 ' S 2 Q , zkm -
' 2, 4 ]E Z'E C ;) T < J! E E C ;) *$ ') 4 b
e$3) 4 i4 ) $4 '% S 2Q , $-
< 4 ?. '@A" 2 B zP
. . <' Z -$) 7 3) 2 A. <4 = 4 S?. S 2I >4 $ z&
Y 3 % = > ) $ z–
E .> Z?7 2 ?J > ) 5 , S$ z
$; ' S$ z{
'A Y _ 2 $7 S zŒ
3, E E( S'I ; $ 4‚ ' ~ $ RZ $ < ' z•
)!= 1 ' / < 2) $@
B 2 A] 4 z[
! $ 4‚ ' & 3 D . c3= 4 ' D . . RZ $ E . > ) zy
?6 3, i F;
': $J , RAB ' . j . B 2 A] < ! K' zk - 8
* ') 3 F=

1
B - = 9 >. 1 J VN Q 8 \\9 5

S %4 ! 2( ! S 2 Q , < '3 X fB) zm - 8


*$3 3L hkrg - - >4 D'A)
- >4 i4 ) ? S 2Q , $- ' 97 J ;) zp - 8
>4 b *$34 A S $Z , • .‚ 2 ' $J u4 - @G V _ $3YI $34 A
* : EI -$) 'H ' 9 ' 'J
5 O f. 3 4! , < > ‚ P_' S 2 Q , • .‚ ]E zr - 8
4! ,4 ' - A) Π'I f8 @ ZV 6 ': RAB ' .
*$) ZV 6 !
e$) 4 [) S 2 Q , P4 _ zkp-
*w' ! ': RAB ' . 5 O IA S zP
* ': $7 2, 4 ] E -$) 4 ~ $ 54$8 24' z&
*w' ! 6' ~ $ - A ] E 2. '7 D . z–
* ]E R4'( 6' ! -$) J ': 2, 4 z
5O ' >4 * ') J D. . L$ S 2Q , ' zkr -
2 ?J •= >4' 3, '( i4 ) ” ( ': RAB ' .
* ' $ '7 $4$A R Z ! i.' < ] E
• ;) T ': ] E S 2 Q S +3 $3Y_' S 2 Q , zks -
- Y . 5 Z i4 ) -'( - 'A 97 h 4 ' ( 4? g -$) 4 ?6 2(J
' += [6 -' ) $7 - Y . 24 $( IA" ':
*$ . - :/ ': RAB ' . 2. . 5 O
24 < ]E -$) 4 $7 ': K' j . S 2 Q , 2 L 5 zkt -
* ') > B $. < 4 ‚ f4'8 ') @3% = 3 , B j. E
T 4 - < ' . R Z b < ' ( …Y '3 zkl -
- $33 - Y . 4 1 !@ $3YI ! Π3 . 54 6
R E -$% - Y . 4 F T - Y. ' T 4
'( • QC ;) i.' </ - Y . 2 ,( 3, ! 54 6 . ) ':
*$ ') 2 , ( %; < 3 A6
$4 A > AT $4 $ H T S - $4 1 ! @ >4 z- 8
* + Z -$33 T 7 T $34/ , 6 R Z - >4

2
B - = 9 >. 1 J VN Q 8 \\9 5

w % " 7 ': $J ^" - J ': 1 49= zkq -


RA w ) RJ 24 " 7 '% ': $J ^" '% %4 ! > " 5, '
* ' $ '7 ') f4'8 R E
-$33 J ! i.' ': '"' 5 '. … Y 4 ' zko -
e ') D O </
* 'ZR 4 ': f J i.' D O 2. '7 zP
*F $@B ': f J O; z&
* ]E - ) — @_ 3 ': $J z–
> 4/ >4 " $3 ! S 2Q , 4 ': f J PI; -$ % z
*$4 A J ': D O ' . %4 ! 'J >4
24 ] < $ ': - ' • Q• ;) ?6 R ) ': $J z{
*$) -$) J
* b , 4. ! J'87 $ I %, zŒ
< D. V _ -$) $3 5 O $3YI 4 " -+. A zmv -
-' $34 , 2 B, >ŠAO T 3, > 4/ >4 —?
- htg F) '7 IA 1 !: $3 Z - Y. ' B < . '7 IA
*$34 A 4 2 A " ' <' A 4

, , > / > Y 1 + 8 (* 5 5

- 4 " > 4/ƒ p - $3 3. ': 9:2. . ')


kpqq‰vm‰ko y ' I" „< 4 2Š kpqm &'8 <' Z hpmg
': $J ! z ': $J ! $ .ƒ 4 " RAB ' .
e 'A f4'8 4 [ ) „ %4

e$ w' [ % B 4 ?OJ RAB ' . >4 zk-


*$) kpqm &'8 <' Z RAB ' . >4 <' Z ' 3 e<' Z zP
<' Z pm - 4 " > 4/ RAB ' . >4 > 4/ '3 e 4 " > 4/ z&
*$) kpqt &'8

3
B - = 9 >. 1 J VN Q 8 \\9 5

2. ': 9:2. . ') RAB ' . >4 ') ' 3 e ') z–


$ I 27 . 4 - ' 9:2. . +G ‡ 4 … Y '3 > 4/ m - f"'
* : R % '% 'A
': $J ! RAB ' . >4 %4 ! ' 3 e %4 ! z
*$4 A 2 B, ') ' f 2. %4
%4 ! X4 ' f ': $J ! e ! z{
S T w' $7 4 . - 'A ': $J
*$
': ' 97 2. ! RAB ' . >4 B ! '3 e B ! zŒ
': $7 • %4 ! i.' </ ': RAB ' . $ 4 !
*$4 A
RAB ' . >4 •= >4 ! >4 eS ': $J ! z•
* : > RAB ' . >4 m - P $3 5 O ') - / „S ! ƒ < '3 2(
RAB ' . >4 •= >4 ! >4 e ': $J ! z[
> RAB ' . >4 m - & $3 5 O ') - / „ ! ƒ < '3 2(
* :
RAB ' . >4 •= >4 ! >4 e J'87 ': $J ! zy
> RAB ' . >4 m - $3 5 O ') - / „ J'87 ! ƒ < '3 2(
* :
S i4 ) $) J'87 ! S Z ! >4 e ! z
$J S $Z A - + . X4 Z EB •= $ ' %4 ! ': f
*$34 A '! - + . w V 6 J'87 C ;) ':
X ': -$33 J! ' ?6 - e ': zn
-$) $ ' ! i.' D 4 . - A) X4 X 'A $ I TE $J u4 ':
*$3 A </ X 'A $ I > w 2(J $' 8;) ':
2. . RA % ': 2. . 'A e(CP) ': 2. . z
-$) >4 $ IIA > $ . 5O 7. Z'E 3, 1 E > 'Z
V 6 T < J S 2Q , ': $J ! .- = ! . '7 RZ $
*2. ! %4 ! 2. . >4 >4 $ *$3 • ;% -$33 A

4
B - = 9 >. 1 J VN Q 8 \\9 5

2@" ': @ . . 5 O3 4 RAB ' . 'A e(CPS) ': RAB ' . z


* : >4 $ ! %4 ! ': 24 4$ IA •!" N4 %
@ $34/ , @ . . !, 2;. !, S 'A e 'A $ I 27 . 4 z`
*$) $I Π@ ': 24 4$ '
2 V$ V $ $3G 4 X4 5E( 2. 8;% .$ e ; zj
* : - 4 i.' ') 4 -$) 4 <' Z f"' -$@
') 4 -$) 4 <' Z f"' 2. 8;% .$ e .‹ z1
^" 4. : . 'Z 4 -$@ ' P4 _ %; Z'E D?E . > )
2. -$) - S . . <' Z 4 < . I *$ S $) 'Z
* ') 7 3) .‹
2 B, 2 $7 4 $ ' 8Z $ 2 - +3 ' 3 e- +3 zC
.$) E E 4 Z'E 2 8;) </ $3
A Z S ']' <' Z f"' 2. 8 Z - +3 e 2 ) z’
SE '. b? . . <' Z S @G R@G RJ I 2. . f"' 2 $8
</ S @. 4 . $J - 3= F 4 : &' ( 2 P4 _ !" B
*$) 2 5IB
b 'A @ 4 .‹ .‹ ; I e 4 " - + . zw
2. S N4 8 4 n S!I @/ <' Z D'A) 4 -+ . I 2 )
h '% $7 24 4$ <' Z n'7 g *$ ') -$ 4 " -+.

T ': IJ < > w +G ‡ 4 … Y '3 zm -


”( </ F)'= 2( ! $ . '7 + '+G %4 ! R ) '%
X4 A f I I. … Y ': $J ! '"' 2 '
e : > 4 [) ! K' ! %4 !
eS ! hP
A ': $7 4 S '6 2. , 8(3 !
*$4 A < ]E PI ;
*$3 2 B, S ! < '3 : ! zk - 8
F; < 4 % 2. ! >4 J'87 ! $- < zm - 8
B - = 9 >. 1 J VN Q 8 \\9 5

*$4 A 4 ': $7 b J'87


e ! h&
-' %4 ! ': 97 ' f $3 ' 4 " -+. X4
*$34 A ! •. '7 2 B,
': $7 4 2@" 4 " - + . $3G V ? • $' ! z- 8
$3. 4 '! YI ‹ -+. 4 2 ' ~ % -'
* ') • . $ ': RAB ' .

e B ! h–
>) 'J '7 K' -+. 4 -+. $B NO. X4 !
4 S $Z '7 2 B, - ' “, J $3 ' RAB ' . > A p - 24 w' i4 )
*$34 A </ ': $J B !
! •. S $Z B ! •. < ]E . -+ . z k- 8
*$ ') • . S ! R4n $3 ' ! >4 $ -
RAB ' . B ! •. ]E ': RAB ' . 5 O S$ 'J z m- 8
$' ]E %4 ! i.' ] E -W4 i4 ) '" . -+. ':
$B S ! R4n B ! •. ' D '7 2 B, - '
*$4 A 2, 4 ! •. '

e J'87 ! h
P4 B J'87 F; - Y. ' ': $J ! >4
$3 '7 %4 ! •. ' Z'E A Y 2 ?J •= </ -$)
') f4'8 @ %4 ! i.' J'87 ! 2 ?J i4 ) > 4/ *2, :
*$ . $ '7

$ 4‚ •= B J'87 S ! •. ' zp -
* : J ') f4'8 %4 ! i.' 6' RAB ' .

-$@ RAB ' . >4 p - '9 ! A - . zr -


B - = 9 >. 1 J VN Q 8 \\9 5

*$3) S $ @A I 4 P_' '! ! - ' %4 !

! ƒ < '3 2( ': f S i4 ) J'87 ! zs -


$J S $Z ' -+ . Z EB •= $3 ' %4 ! „
':g (G2C) % 2 (G2B) - +3 2 “, J ':
*$34 A h A -+. w V 6 J'87 C ;)

I7 ': $J S $Z .‹ i.' ': $J zt -


<3 b $34 A <' Z pm - 4 " > •/ kk - 5 O
*$) A '7

u4 ') I" > A%) -8 s - l • " RAB ' . >4 zl -


*$ . >4 ] f4'8 $4 : !: kpqq‰vm‰ko

; C =T ' (< I 4A 1 D (H Z 3 L % 1 5
U

4 [) '% ': 9+ . . ') kpqq‰vp‰pk u 4 $3. >4


e$ . f4'8

. 6
: e$ 2 ) < BY34n K' 2 < $7 • ' I '6
$33 • $7 4 @/ (Identity Provider) $ -$@ , 4 . 3)
) 2 % - : 4 X4 $' - . 24 '"' X4 *(Service Provider)
< %4 , 4 . 3) -$33 > i.' ?6 2. S $7 < :$33 • *$)
• 24 '"' S $ $7 34 ' $7 -$33 • *$34 A A 2. -$) D .
4 . 3) < :$33 > i.' 2. ?6 j . A8 >4 ) : A8 5 $3
$) 3 A6 ['O. ' $' -$) D . ?6 7 * ') • ,
4 . 3) 24 4$ *$) $ '7 - Y . 24' - Y. ' 1 4 . 3) 24 4$
B - = 9 >. 1 J VN Q 8 \\9 5

-+ . A < 2. • ;% 4 X4 - + . X4 24' `''3


< 3 A6 ['O. w' ?6 '" S$ * : 1 B . P 6 2. > A 2
'7 4 2A < 3 A6 ['O. P4 B 2@" > A $) A - . B $'
* ' $ '7
1 *
ehIdentificationg 4 . 3)
': $J R Z 24 '"' 24' > B $34/ ,
ehAssurance Levelg < 3 A6 NO.
24 '"' 4 . 3) ^ 3 f J > E4 "
ehAuthenticationg 24'
$J $B )^ 3 4 $7 . . ]E < 24 '"' 24' <$) (
':

>K @ D (H Z 3
>4$ ') :- $ > B @/ X 4 < ! j . . < 3 A6 ['O.
$ ') E I . @G -$) :- $ . X 4 f
* : R ) < 3 A6 ['O. 5 O 24' 4 . 3) S $3 . >4 5 O

P4 B < 3 A6 NO.
$ '" $4$@ '+M Level 1
2. ) $4$@ $( $B Level 2
I7 7< i.' $4$@ $( $B ) 4 $4$@
Level 3
2. " '
2. " ' I7 < 54 6 ) 4 $4$@ Level 4

1 Ni

4 . 3) -'( < 3 A6 NO.

'"' A F 4= S 2 Q Y4 % <$ Level 1


+4 S ~ $ , ] $) • @/ 4 B 4 . 3) ~ $ .m
4 <3 C'8; NO. >4 * ' $ '7 P4 B Y -' 2 B, K' "' Level 2
*$) 2 <4 %
B - = 9 >. 1 J VN Q 8 \\9 5

C'8; kvv f 4 . 3) ~ $ .m • 'J


Level 3
*2 <3
C'8; ksv f 4 . 3) ~ $ .m • 'J
Level 4
2 <3

~ $

kv D . p
h RZ $ g eD L mv D . s p D' Z ' E.
D . p › hkvg Z K' › hqvg~ $ š kvv rv D . kv s -+ .
hkvg E . tv D . kv
› hsvg 4$ RH) › hqvg ~ $ š ksv sv R 4$ IH) < '3
hkvg E . › hkvg A. kv A= A. Z K'
E . › hsvg 4$ RH) › hqvg ~ $ š ksv rv 3. 3)

~$
hmvgs p rv I
› hkvg Z K' › hqvg ~ $ š ksv mv 9:

L$
htvg D . kv mv 3 ':

41 > R

3, 8;% < 3 A6 NO.


hard tokens or software based X.509 certificates in
Level 1
conjunction with pass-phrases or pins.
hard tokens or software based X.509 certificates in
Level 2
conjunction with pass-phrases or pins.
includes some hardware based X.509 certificate systems,
Level 3
such as crypto tokens.
includes some hardware based X.509 certificate systems,
Level 4
such as crypto tokens.

> O
NO.
P4 B S < 3 A6 NO.
':
-$) J .< V 8 ': NO. >4 Level
! Rudimentary
: Z - Y. ' 1
-$) J .< V 8 ': NO. >4 Level
-E Basic
: Z - Y. ' 2
B - = 9 >. 1 J VN Q 8 \\9 5

-+. A - Y. 2 I Z ': NO. >4 Level


?6 Medium
$) 3
-+. A - Y. 2 I Z ': NO. >4 Level
> ?= High
*$) 4
1 > > O - 9 C'
J'87 $ I %, 4 <$%A: NO.
$I %, 'J k pv RZ $ CRL % ': D O
Level 1
J'87
$I %, 'J 2 . t 2 . mr RZ $ CRL % ': D O
Level 2
J'87
$I %, 'J 2 . m 2 . km RZ $ CRL % ': D O
Level 3
J'87
%, 'J 2 . k‰m 2 .r RZ $ CRL % ': D O
Level 4
J'87 $ I

FE X Y NO.
') S Y k i.' $ ' ': $J P4 _ I Level 1
') S Y m i.' $4 RZ $ ': $J P4 _ Level 2
') S Y p i.' $4 RZ $ ': $J P4 _ Level 3
') S Y p i.' $4 RZ $ ': $J P4 _ Level 4

': - NO.
D.t L $ Level 1
D.r L $ Level 2
D.m L $ Level 3
D.k L $ Level 4

< CA ! + ( $I < %= ; NO.


$) A + ( $I :Backup ! Level 1
$ ') :Backup $4 + ( $I Level 2
$ ') :Backup $4 + ( $I Level 3

5
B - = 9 >. 1 J VN Q 8 \\9 5

$ ') :Backup $4 + ( $I Level 4

': $J 2. '7 > IJ , NO.


$ '" $Zx Level 1
J S 2 Q , 2. '7 < c3= ’ 4@ < ':
Level 2
$ ')
J S 2 Q , 2. '7 < ’ 4@ < ':
Level 3
$ ')
$ ') J S 2 Q , 2. '7 ‘ ( 4@< ': Level 4

. NO.
4D.p 3 2. . > A . '3 .
Level 1
') S
4D.m 3 2. . > A . '3 .
Level 2
') S
S . 3 2. . > A . '3 .
Level 3
')
S . 3 2. . > A . '3 .
Level 4
')

9:S $3 NO.
$ $ Distinguished name 4@ ': Level 1
$ Distinguished name 4@ ': Level 2
$ Distinguished name 4@ ': Level 3
$ Distinguished name 4@ ': Level 4

V 8 Q E NO.
$3 . Q ': 2, 4 J'87 $ I V 8 $4 4@< Level 1
$3 . Q ': 2, 4 J'87 $ I V 8 $4 4@< Level 2
$3 . Q ': 2, 4 J'87 $ I V 8 $4 4@< Level 3
$3 . Q ': 2, 4 J'87 $ I V 8 $4 4@< Level 4

1
B - = 9 >. 1 J VN Q 8 \\9 5

^4 Z 2 Q $@+ $3 NO.
2 ^4 Z $@+ < $ < 'A • ;% Level 1
') $@+ D . l $4 ! -$) 2 Q^4 Z Level 2
') $@+ D . kv $4 ! -$) 2 Q^4 Z Level 3
') $@+ D . mv $4 ! -$) 2 Q^4 Z Level 4

< E $ I D'6 B NO.


$3) RSA B kvmr 3 D B $4 $I Level 1
$3) RSA B kvmr 3 D B $4 $I Level 2
$3) RSA B mvrq 3 D B $4 $I Level 3
$3) RSA B mvrq 3 D B $4 $I Level 4

J'87 $ I … Y ' . K? 6 NO.


$ '" J 7 $3 Level 1
…Y w' ? 24 ' T f J < K?6
Level 2
J'87$ I
i.' J'87 $ I … Y ? w' $3 $3 T
Level 3
$) - 'A • ;% ': $J RZ T f J
i.' J'87 $ I … Y ? w' $3 $3 T
Level 4
$) - 'A • ;% ': $J RZ T f J

J'87 $ I 2 ,( w' $3 RZ $ NO.


4 !, 2;. 2. > A 4@ < J'87 $I CA T $ I
Level 1
$ ') - 7n !, S
> A 4@ < J'87 $I !, 2;. $4 CA T $ I
Level 2
$ ') - 7n !, S 4 !, 2;. 2.
- 7n !, 2;. $4 4@ < J'87 $I CA T $ I
Level 3
$ ')
- 7n !, 2;. $4 4@ < J'87 $I CA T $ I
Level 4
$ ')

2
B - = 9 >. 1 J VN Q 8 \\9 5

J'87 $ I %, 'J 7 2B. NO.


$4/ A $4$= 4 @ < J'87 $ I %, 'J 4 ]x Level 1
$ 4/ '"' + ( J'87 $I %, 'J 4 <4 Level 2
$4/ '"' + ( J'87 $I %, 'J $" <4 Level 3
$ 4/ '"' + ( J'87 $I %, 'J $4$) <4 Level 4

Uw F > > T D (H Z 3 .

OID NO.
2.16.364.101.1.1.1.1.1 Level 1
2.16.364.101.1.1.1.2.1 Level 2
2.16.364.101.1.1.1.3.1 Level 3
2.16.364.101.1.1.1.4.1 Level 4

/ D (H Z 3
': $J ! X4 $ ') $3 E • R Z ': K' "' PI ; !
2E, ' x *$4 A . - = < 3 A6 NO. X4 % ': 2. . $ '
2 2 $ . * $ '" < 3 A6 ['O. P J' $ . ' @"
High Rudimentary, Basic, Medium < 3 A6 ['O. @G . 2 4 /
*$ ') - S Level1, 2, 3, 4 >4 3 : -'

• R Z ': NO. CA Class


Level 1 Class 1
Level 1, 2 Class 2
Level 1, 2, 3 Class 3
Level 1, 2, 3, 4 Class 4
IC / D (H Z 3
< 3 A6 NO. RZ $ ! K'
Class 4 %4 !
Class 4 S !
Class 3 !
Class 3 !
Class 1 J'87 !
Class 2 B !

3
B - = 9 >. 1 J VN Q 8 \\9 5

&/ >: M >


Latest
S 2 Q! < ': $J ! version of < 3 A6 ['O.
FIPS 140
series
Level 1
(Hardware N/A (Software) N/A Level 1
or Software)
Level 1 Level 1
Level 2
(Hardware (Hardware or Required Level 2
(Hardware)
or Software) Software)
Level 2 Level 2 Level 2
Required Level 3
(Hardware) (Hardware) (Hardware)
Level 3 Level 3 Level 3
Required Level 4
(Hardware) (Hardware) (Hardware)

4
[+ [= 4 5

1. An overview of issues and the deployment of existing ITU-T Recommendations for secure
telecommunications, International Telecommunication Union, ITU-T 2006

2. Bhattacharya, K.K. & Saha, S. 2004, ‘Trust Dimensions in E-Retailing: A Strategic


Exploration’, International Engineering Management Conference 2004, Retrieved: April
25, 2007, from IEEE.

3. Chen, U.H. & Barnes, S. 2007, ‘Initial trust and online buyer behaviour’, Industrial
Management & Data Systems, Vol. 107, No. 1, pp. 21-36. Retrieved: April 16, 2007,
from Emerald. (is available at www.emeraldinsight.com/0263-5577.htm)

4. Connolly, Chris & Dijk, Peter van, "Individual Digital Certificates and PKI", available at
www.cyberlawcentre.org/Articles/Cyberspace_May.../DigitalCert_PKI.ppt

5. Corbitt, Brian J., Thanasankit, Theerasak & Yi, Han, 2003, "T rust and e-commerce: a
study of consumer perceptions", Electronic Commerce Research and Applications, 2
(2003), pp.203–215, Retrieved: April 13, 2007, from Elsevier.

6. Datta, A., Hauswirth, M. & Aberer, K. 2003, ‘Beyond “web of trust”: Enabling P2P E-
commerce’, International Conference on E-Commerce, Retrieved: April 25, 2007, from
IEEE.

7. Dayal, S., Landesberg, H. & Zeisser, M. 1999, ‘HOW TO BUILO TRUST ONLINE’,
Marketing & Tchnology, Fall 1999.

8. Degeratu, Alexandru, Arvind Rangaswamy, and Jianan Wu (2000), “Consumer Choice


Behavior in Online and Traditional Supermarkets: The Effects of Brand Name, Price, and
Other Search Attributes,” International Journal of Research in Marketing, 17(1), 55–78.

9. The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions,
2004

10. Doney PM, Cannon JP, Mullen M. Understanding the influence of national culture on the
development of trust. Academy of Management Review 1998;23(3):601–20.

11. Dongmin K, Izak Benbasat, Trust-related arguments in internet stores: a framework for
evaluation, Journal of Electronic Commerce Research, VOL. 4, NO. 2, 2003.

12. Eastlick, M.A. Lotz, S.L. & Warrington, P. 2006, ‘Understanding online B-to-C
relationships: An integrated model of privacy concerns, trust, and commitment’, Journal
of Business Research 59 (2006), pp. 877–886. Retrieved: April 16, 2007, from Science
Direct.

13. Fan, J.C. 2006, ‘Trust and Electronic Commerce - A Test of an E-Bookstore’,
International Conference on e-Business Engineering. Retrieved: April 25, 2007, from
IEEE.

14. Gao, Y. 2005, ‘Factors influencing user trust in online games’, The Electronic Library,
Vol. 23, No. 5, 2005, pp. 533-538. Retrieved: April 19, 2007, from Emerald. (is available
at www.emeraldinsight.com/0263-4503.htm)
15. Gefen, D. 2000, ‘E-commerce: the role of familiarity and trust’, International Journal of
Management Science, Vol. 28, pp. 725-37. Retrieved: April 12, 2007, from Science
Direct

16. Gefen, D., Karahanna, E. & Straub, D.W. 2003, ‘Trust and TAM in online shopping: an
integrated model’, MIS Quarterly, Vol. 27 No. 1, pp. 51-90. Retrieved: April 16, 2007,
from Emerald.

17. Gefen, D. & Straub, D.W. 2004, ‘Consumer trust in B2C e-Commerce and the
importance of social presence: experiments in e-Products and e-Services’, Omega 32
(2004), pp. 407 – 424. Retrieved: April 10, 2007, from Science Direct

18. Grabner-Krauter, S. & Kaluscha, E.A. 2003, ‘Empirical research in on-line trust: a review
and critical assessment’, Int. J. Human-Computer Studies 58 (2003), pp. 783–812.
Retrieved: April 16, 2007, from Science Direct.

19. Guo, Z. , Okuyama, T. & Finley. Jr M. R. 2005, ‘A New Trust Model for PKI
Interoperability’, Joint International Conference on Autonomic and Autonomous Systems
and International Conference on Networking and Services-2005. Retrieved: April 25,
2007, from IEEE.

20. Harridge-March, S. 2006, ‘Can the building of trust overcome consumer perceived risk
online?’, Marketing Intelligence & Planning, Vol. 24, No. 7, 2006, pp. 746-761.
Retrieved: April 26, 2007, from Emerald. (is available at www.emeraldinsight.com/0263-
4503.htm)

21. Head M, Hassanein K; Trust in e-Commerce: Evaluating the Impact of Third-Party Seals;
Quarterly Journal of Electronic Commerce; 2003.

22. H.-W. Kim, Y. Xu, J. Koh, A comparison of online trust building factors between
potential customers and repeat customers, Journal of the Association for Information
Systems 5 (10) (2004) 392–420.

23. Jarvenpaa, S.L., Tractinsky, N. & Vitale, M. 2000, ‘Consumer trust in an Internet store’,
Information Technology and Management 1 (2000), pp. 45–71.

24. Jensen, C. Potts, C. & Jensen, C. 2005, '


Privacy practices of Internet users: Self-reports
versus observed behavior' , Int. J. Human-Computer Studies 63 (2005), pp. 203–227. April
16, 2007, from Science Direct.

25. Jøsang, A. Ismail, R.& Boyd, C. 2007, ‘A survey of trust and reputation systems for
online service provision’, Decision Support Systems 43 (2007), pp. 618– 644. Retrieved:
April 16, 2007, from Science Direct.

26. John D. Howard, Longstaff, Thomas A., 1998, A Common Language for
Computer Security Incidents, Unlimited Release Printed October 1998
27. Kaplan, S.E. & Nieschwietz, R.j. 2003, ‘A Web assurance services model of trust for
B2C e-commerce’, International Journal of Accounting, Information Systems 4 (2003),
pp. 95–114. Retrieved: April 13, 2007, from Elsevier.

28. Keller, Kevin (1993), “Conceptualizing, Measuring, and Managing Customer-Based


Brand Equity,” Journal of Marketing, 57 (January), 1–22.

29. Kim, D.J. Song, Y.I. Braynov, S.B. & Rao, H.R. 2005, ‘A multidimensional trust
formation model in B2C e-commerce: a conceptual framework and content analyses of
academia / practitioner perspectives’, Decision Support Systems 40 (2005), pp. 143– 165.
Retrieved: April 12, 2007, from Science Direct.
30. Kim, D.J. Ferrin, D.L. & Rao, H.R. 2008, ‘A trust-based consumer decision-making
model in electronic commerce: the role of trust, perceived risk, and their antecedents’,
Decision Support Systems 44 (2008), pp. 544– 564. Retrieved: June 20, 2008, from
Science Direct.

31. Kim, H., Xu, Y. & Koh, J. ‘A comparison of online trust building factors between
potential customers and repeat customers’, Journal of the Association for Information
Systems 5 (10) (2004), pp. 392–420. Retrieved: April 19, 2007, from Emerald.

32. Klang, M. 2001, ‘Who do you trust? Beyond encryption, secure e-business’, Decision
Support Systems 31(2001), pp. 293-301. Retrieved: April 16, 2007, from Science Direct.

33. Kochar, Jagdeep S., Application of Digital Signatures: Case Studies, is available at
www.elitex.in/paper2008/jskochar.ppt

34. Kolsaker, A. & payne, C., ‘Engendering trust in e-commerce: a study of gender-based
concerns’ Marketing Intelligence & Planning, Vol. 20, No. 4, 2002, pp. 206-214.
Retrieved: April 19, 2007, from Emerald. (is available at www.emeraldinsight.com/0263-
4503.htm)

35. Koufaris, M. & Hampton-Sosa, W. 2004, ‘The development of initial trust in an online
company by new customers, Information & Management, Vol. 41, pp. 377-97. Retrieved:
April 16, 2007, from Emerald.

36. Lancastre, A. & Lages, L. F. 2006, ‘The relationship between buyer and a B2B e-
marketplace: Cooperation determinants in an electronic market context’, Industrial
Marketing Management 35 (2006), pp. 774 – 789. Retrieved: June 20, 2008, from
Science Direct.

37. Lee M.K.O, Turban E; Trust in Business-to-Consumer Electronic Commerce: A Proposed


Research Model and Its Empirical Testing; International Journal of Electronic
Commerce; Vol. 6, No. 1, 75-91, 2001.

38. Lee, Y. & Trim, P.R.J. 2006, ‘Retail marketing strategy_The role of marketing
intelligence, relationship marketing and trust’, Marketing Intelligence & Planning, Vol.
24, No. 7, 2006, pp. 730-745. Retrieved: April 16, 2007, from Emerald. (is available at
www.emeraldinsight.com/0263-4503.htm)

39. Liao, C. Palvia, P. & Lin, H-N. 2006, ‘The roles of habit and web site quality in e-
commerce’, International Journal of Information Management 26 (2006), pp. 469–483.
Retrieved: April 16, 2007, from Science Direct.

40. Mayer, R.C., Davis, J.H. & Schoorman, F.D. 1995, ‘An integrative model of
organizational trust’, Academy of Management Review, Vol. 20 No. 3, pp. 709-34.
Retrieved: April 16, 2007, from Emerald.

41. McDonough, John, 2003, "Case Study Proposal, Revenue On-Line Service (ROS), Focus
3 –Government", Electronic Records Unit National Archives of Ireland,

42. McKnight, D.H. & Chervany, N.L. 2001, ‘What trust means in e-commerce customer
relationships: an interdisciplinary conceptual typology’, International Journal of
Electronic Commerce, Vol. 6 No. 2, pp. 35-59. Retrieved: April 11, 2007, from Emerald.

43. Merrilees, B. and Frye, M-L. (2003), ‘E-trust: the influence of perceived interactivity on
e-retailing user’, Marketing Intelligence & Planning, Vol. 21, No. 2, pp. 123-8.
Retrieved: April 16, 2007, from Emerald.

44. Millar, T. Mathhew, L.N. Shen, S.Y. & Shaw, M.J. 2005, ‘E-business Management
Models’.

45. Miyamoto, T. & Rexha, N. 2004, ‘Determinants of three facets of customer trust_A
marketing model of Japanese buyer–supplier relationship’, Journal of Business Research
57 (2004), pp. 312– 319. Retrieved: April 25, 2007, from Science Direct.

46. Mossop, S; Trends & Myths of Canadian Internet & eCommerce; presentation material
by Angus Reid Group at Bureau for e-Business Research; 2000.

47. Mui, L., Mohtashemi, M. & Halberstadt, A. 2002, ‘A Computational Model of Trust and
Reputation’, 35th Hawaii International Conference on System Sciences-2002. Retrieved:
May 25, 2007, from IEEE.

48. Muniz, Albert M., Jr., and T.C. O’Guinn (2001), “Brand Community,” Journal of
Consumer Research, 27 (March), 412–32.

49. Murphy, G.B. & Blessinger, A. A. 2003, ‘Perceptions of no-name recognition business to
consumer e-commerce trustworthiness: the effectiveness of potential influence tactics’,
Journal of High Technology Management Research 14 (2003), pp. 71–92. Retrieved:
May 12, 2007, from Science Direct.

50. Pan, Xing, Brian T. Ratchford, and Venkatesh Shankar (2002), “Can Differences in E-
Tailer Prices Be Explained by Service Quality?” Journal of the Academy of Marketing
Science, 30 (4), 433–46.

51. Panduranga, S.N. 2005, ‘Simplifying Mobile Commerce Through A Trusted Transaction
Broker’, ICPWC, Retrieved: April 25, 2007, from IEEE.

52. Pennanen, K. Tiainen, T. & Luomala, H.T. 2007, ‘A qualitative exploration of a


consumer’s value-based e-trust building process: A framework development’, Qualitative
Market Research: An International Journal, Vol. 10, No. 1, 2007, pp. 28-47. Retrieved:
April 16, 2007, from Emerald. (is available at www.emeraldinsight.com/1352-2752.htm)

53. Pavlou, P. A. 2002, ‘Institution-based trust in interorganizational exchange relationships:


the role of online B2B marketplaces on trust formation’, Journal of Strategic Information
Systems 11 (2002), pp. 215–243. Retrieved: April 15, 2007, from Science Direct.

54. Qaddus, M* Achajari, D. 2005, ‘A model for Electronic commerce success’,


Telecommunication policy 29 (2005), pp. 127-152. Retrieved: April 12, 2007, from
Science Direct.

55. Ratnasingam P. 2004, ‘The impact of collaborative commerce and trust in Web services’,
The Journal of Enterprise Information Management, Vol. 17, No. 5, 2004, pp. 382-387.
Retrieved: April 16, 2007, from Emerald. (is available at www.emeraldinsight.com/1741-
0398.htm)

56. Roy, M., Dewit, O. & Aubert, B. A. 2001, ‘The impact of interface usability on trust in
Web retailers’, Internet Research: Electronic Networking Applications and Policy, Vol.
11, No. 5, 2001, pp. 388-398. Retrieved: April 19, 2007, from Emerald.

57. Salam,A.F., Iyer, L., Palvia,P. & Singh, R., 2005, ‘TRUST in E-Commerce’,
COMMUNICATIONS OF THE ACM, February 2005/Vol. 48, No. 2. Retrieved: April 22,
2007, from Ebsco.

58. Sanders, Mark, Use of Digital Certificates, available at


https://www.og.decc.gov.uk/portal_files/digcert_info_2007.pdf

59. Schaupp, L. C. & Carter, L. 2005, ‘E-voting: from apathy to adoption’, The Journal of
Enterprise Information Management, Vol. 18, No. 5, 2005, pp. 586-601. Retrieved: April
16, 2007, from Emerald. (is available at www.emeraldinsight.com/1468-4527.htm)

60. Schmidt, S., Steele, R., Dillon, T.S. & Chang, E. 2007, ‘Fuzzy trust evaluation and
credibility development in multi-agent systems’, Applied Soft Computing 7 (2007), pp.
492–505. Retrieved: April 23, 2007, from Science Direct.

61. Shankar, V. Urban, G.L. & Sultan, F. 2002, ‘Online trust: a stakeholder perspective,
concepts, implications, and future directions’, Journal of Strategic Information Systems
11 (2002), pp. 325–344. Retrieved: April 25, 2007, from Science Direct.

62. Shneiderman B; Designing websites to enhance online trust; Communications of the


ACM, Vol. 43, No. 12, 81- 83, 2000.

63. Siala, H. O’Keefe, R.M. & Hone, K.S. 2004, ‘The impact of religious affiliation on trust
in the context of electronic commerce’, Interacting with Computers 16 (2004), pp. 7–27.
Retrieved: April 16, 2007, from Science Direct.

64. Smith, A.D. & Manna, D.R. 2004, ‘Exploring the trust factor in e-medicine’, Online
Information Review, Vol. 28, No. 5, 2004, pp. 346-355. Retrieved: April 16, 2007, from
Emerald. (is available at www.emeraldinsight.com/1468-4527.htm)

65. Smith, M., Bailey, J., Brynjolfsson, E. 2000, '


Understanding digital markets: review and
assessment', Understanding the Digital Economy. MIT Press, Cambridge, MA. Retrieved:
January 24, 2008, from http://www.econ.jhu.edu

66. Stewart, K.J. 2003, 'Trust Transfer on the World Wide Web' , Organization Science, Vol.
14, No. 1. (Jan. - Feb., 2003), pp. 5-17. Retrieved: January 24, 2008, from
http://www.jstor.org/journals/

67. Su, C., Zhang, H. & Bi, F. 2006, ‘A P2P-based Trust Model for E-Commerce’,
International Conference on e-Business Engineering, Retrieved: April 25, 2007, from
IEEE.

68. Sultan, F., Urban G.L., Shankar, V. & Bart, I.Y. 2002, ‘Determinants and Role of Trust in
E-Business: A Large Scale Empirical Study’, MIT Sloan School of Management, Working
Paper 4282-02, December 2002. Retrieved: January 16, 2008, from
http://ssrn.com/abstract_id=380404.

69. Teo, T.S.H & Liu, J. 2007, ‘Consumer trust in e-commerce in the United States,
Singapore and China’, Omega 35 (2007), pp. 22–38. Retrieved: April 12, 2007, from
Science Direct.

70. The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked
Questions, May 3, 2004

71. Turban, E. Lee, j. Viehland, D. & King, D. 2004, ‘E-Commerce’ ???

72. Urban, G.L., Fareena Sultan, and William Qualls (2000), “Placing Trust at the Center of
Your Internet Strategy,” Sloan Management Review, 42 (1), 39–48.

73. Walczuch, R. & Lundgren, h. 2004, ‘Psychological antecedents of institution-based


consumer trust in e-retailing’, Information & Management 42 (2004), pp. 159–177.
Retrieved: April 16, 2007, from Science Direct.

74. Wang, Y.D. & Emurian, H.H. 2005, ‘An overview of online trust: Concepts, elements,
and implications’, Computers in Human Behavior 21 (2005), pp. 105–125. Retrieved:
April 16, 2007, from Science Direct.

75. Winch, G. & Joyce, P. 2006, ‘Exploring the dynamics of building, and losing,
consumertrust in B2C eBusiness’, International Journal of Retail & Distribution
Management, Vol. 34, No. 7, 2006, pp. 541-555. Retrieved: April 19, 2007, from
Emerald. (is available at www.emeraldinsight.com/0959-0552.htm)

76. Windley, Phillip J. 2003, "Digital ID and e-Government", is available at


http://www.windley.com/

77. Wu, J. & Chang, Y. 2006, ‘Effect of transaction trust on e-commerce relationships
between travel agencies’, Tourism Management 27 (2006), pp. 1253–1261. Retrieved:
May 23, 2007, from Science Direct.

78. www.Escrow.com

79. www.AmexBlue.com

80. www.emarketer.com

81. www.instantssl.com/code-signing/
82. http://publib.boulder.ibm.com/infocenter/hodhelp/v9r0/index.jsp?topic=/com.ibm.hod9.d
oc/help/secclientauth.html

83. http://www.verisign.com/

84. www.cwheroes.org/laureates/government/20045120.pdf

85. Xiong, L. & Liu, L. 2003, ‘A Reputation-Based Trust Model for Peer-to-Peer eCommerce
Communities’, International Conference on E-Commerce, Retrieved: April 25, 2007,
from IEEE.

86. Ying-feng, Z. & Pei-ji, S. 2005, ‘The Model for Consumer Trust in C2C Online Auction’,
Retrieved: April 25, 2007, from IEEE.

87. Yousafzai, S.Y. Pallister, J.G. & Foxall, G.R. 2003, ‘A proposed model of e-trust for
electronic banking’, Technovation 23 (2003), pp. 847–860. Retrieved: April 13, 2007,
from Science Direct.

88. Yu, J., Ha, I., Choi, M. & Rho, J. 2005, ‘Extending the TAM for a t-commerce’,
Information & Management 42 (2005), pp. 965–976. Retrieved: April 25, 2007, from
Science Direct.

89. Zboja, J.J. & Voorhees, C.M. 2006, ‘The impact of brand trust and satisfaction on retailer
repurchase intentions’, Journal of Services Marketing, Vol. 20, No. 5, 2006, pp. 381–390.
Retrieved: April 19, 2007, from Emerald. (is available at www.emeraldinsight.com/0887-
6045.htm)

90. Zhang, W., Liu, L. & Zhu, Y. 2005, ‘A Computational Trust Model for C2C Auctions’.
Retrieved: April 25, 2007, from IEEE.

5[ = UW

A 4 Q' R ' 4 . 3) *kpql > )' ) > ' O>


* A" 8 Z S'I -$ % ! - +% * 4 <4 %

5
e– G _ < @ D – G 4 ?6 2Z . +% = *kpqq ) = $ . /J O
HI F 4%

- +3 D$ A 4 S'. R ' FE . *kpqs > 'I $ O>


*^4 3J .$3@ -$ % < 4 2B3J I - +% *X -$33 V 8

B.' ! : (CA) D 4 T $J ! -` = 3. O>

Vous aimerez peut-être aussi