1. Introduction -- 2. Authentication technology: an elementary explanation -- 3. Usability of authentication technology -- 4. Misuse and the burden of proof -- 5. Privacy implications of the use of electronic signatures -- 6. Conclusion -- Literature -- Appendix
Summary
Schellekens describes the main aspects of authentication technologies, presenting the technical insights needed to get to the legal semantics of functional equivalence between traditional and digital signatures. He focuses on the usability of authentication technology and what it entails for its users