Search results

Jump to navigation Jump to search

Page title matches

Page text matches

  • {{r|Public key infrastructure}}
    109 bytes (13 words) - 12:24, 31 May 2009
  • In a [[public key infrastructure]], a '''certificate revocation list''' or '''CRL''' is a trusted source of
    317 bytes (41 words) - 05:49, 8 April 2024
  • A '''public key infrastructure''' or '''PKI''' provides the supporting tools to make it practical to deplo |title = Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
    2 KB (388 words) - 05:49, 8 April 2024
  • In computer and communications security dependent on [[public key infrastructure]] (PKI), a '''certification authority (CA)''' is an organization, verifiabl
    646 bytes (92 words) - 05:48, 8 April 2024
  • {{r|Public key infrastructure}}
    398 bytes (43 words) - 20:00, 29 July 2010
  • An organization, part of a [[public key infrastructure]], which has the authority to issue and revoke [[digital certificate]]s, ac
    310 bytes (42 words) - 15:00, 3 October 2008
  • ...tive, organizational steps needed to make public key practical is called [[public key infrastructure]] (PKI). |title = Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
    2 KB (365 words) - 05:49, 8 April 2024
  • Auto-populated based on [[Special:WhatLinksHere/Public key infrastructure]]. Needs checking by a human.
    594 bytes (73 words) - 19:48, 11 January 2010
  • {{r|Public Key Infrastructure}}
    2 KB (194 words) - 14:48, 4 April 2024
  • | pagename = Public key infrastructure | abc = Public key infrastructure
    2 KB (234 words) - 02:55, 9 March 2010
  • {{r|Public key infrastructure}}
    533 bytes (66 words) - 11:45, 11 January 2010
  • {{r|Public key infrastructure}}
    557 bytes (70 words) - 11:45, 11 January 2010
  • ...ographic techniques such as [[Diffie-Hellman]]. In some cases, an entire [[public key infrastructure]] may be involved.
    3 KB (459 words) - 05:49, 8 April 2024
  • {{r|Public key infrastructure}}
    678 bytes (84 words) - 15:58, 11 January 2010
  • The encryption alone does not make a complete system. [[Public key infrastructure]] is necessary, which consists of a set of services for generating the key ...l signature schemes. Digital signatures are central to the operation of [[public key infrastructure]]s and to many network security schemes ([[Transport Layer Security|SSL/TLS
    8 KB (1,233 words) - 05:48, 8 April 2024
  • *[[Public key infrastructure|Public Key Infrastructure]] (PKI), PKCS, KEYPROV (CT-KIP, DSKPP), EKMI
    4 KB (577 words) - 12:36, 20 August 2010
  • ...blic keys through DNS, rather than through a [[Public key infrastructure | Public Key Infrastructure]].
    7 KB (1,137 words) - 05:56, 11 December 2009
  • The description confuses me a bit. Isn't [[DNS security]] a subset of [[public key infrastructure]], not an alternative? Yes, the primary purpose is to validate the domain i
    3 KB (549 words) - 13:51, 20 March 2023
  • Practical use of asymmetric cryptography, on any sizable basis, requires a [[public key infrastructure]] (PKI). A public key will normally be embedded in a [[digital certificate] ...l signature schemes. Digital signatures are central to the operation of [[public key infrastructure]]s and to many network security schemes ([[Transport Layer Security]] (TLS)
    12 KB (1,872 words) - 06:17, 16 December 2008
  • ...n [[Domain Name System security]], which is bound to generate more about [[public key infrastructure]] and [[Internet Protocol security architecture]].<s> Find someone that und **[[Public key infrastructure]]
    6 KB (917 words) - 05:21, 31 March 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)