10. Privacy and security
The objectives are to ensure :
document integrity (to prevent modification by third parties) ;
a high level of confidentiality for documents (preventing them from being read by a third party);
the identity of the sending and receiving entities.
Appendix H to Recommendation T.30 provides for a registration mode that enables correspondents to authenticate themselves by exchanging their public key.
Registration is a two-step process:
the sending and receiving terminals hash their identity and public key. The resulting "fingerprint" is exchanged without any fax transmission: it's an out-of-band exchange. The public key is sent to the recipient by e-mail, telephone or post;...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Privacy and security
Article included in this offer
"Networks and Telecommunications"
(
172 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Reference
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!