A signature is used to connect an entity with information. This is a key information security objective.
A. Menzes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography. CRC Press, 1996.
Copyright © 2014 Barry Watson. All rights reserved.