Changes

Jump to: navigation, search

An Overview of Public Key Infrastructures (PKI)

4 bytes removed, 21:28, 1 February 2016
m
Text replacement - "<google>BUY_SECURITYPLUS</google>" to "<htmlet>securityplus</htmlet>"
<hr>
<googlehtmlet>BUY_SECURITYPLUSsecurityplus</googlehtmlet>
In the previous chapter we looked at the concepts of symmetrical and public (asymmetrical) key encryption and learned about confidentiality, integrity, nonrepudiation and authentication. In this chapter we will look in detail at Public Key Infrastructures.

Navigation menu