Search results
Jump to navigation
Jump to search
Page title matches
- A '''public key infrastructure''' or '''PKI''' provides the supporting tools to make it practical to deplo |title = Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile2 KB (388 words) - 05:49, 8 April 2024
- Auto-populated based on [[Special:WhatLinksHere/Public key infrastructure]]. Needs checking by a human.594 bytes (73 words) - 19:48, 11 January 2010
Page text matches
- {{r|Public key infrastructure}}109 bytes (13 words) - 12:24, 31 May 2009
- In a [[public key infrastructure]], a '''certificate revocation list''' or '''CRL''' is a trusted source of317 bytes (41 words) - 05:49, 8 April 2024
- A '''public key infrastructure''' or '''PKI''' provides the supporting tools to make it practical to deplo |title = Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile2 KB (388 words) - 05:49, 8 April 2024
- In computer and communications security dependent on [[public key infrastructure]] (PKI), a '''certification authority (CA)''' is an organization, verifiabl646 bytes (92 words) - 05:48, 8 April 2024
- {{r|Public key infrastructure}}398 bytes (43 words) - 20:00, 29 July 2010
- An organization, part of a [[public key infrastructure]], which has the authority to issue and revoke [[digital certificate]]s, ac310 bytes (42 words) - 15:00, 3 October 2008
- ...tive, organizational steps needed to make public key practical is called [[public key infrastructure]] (PKI). |title = Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile2 KB (365 words) - 05:49, 8 April 2024
- Auto-populated based on [[Special:WhatLinksHere/Public key infrastructure]]. Needs checking by a human.594 bytes (73 words) - 19:48, 11 January 2010
- {{r|Public Key Infrastructure}}2 KB (194 words) - 14:48, 4 April 2024
- {{r|Public key infrastructure}}533 bytes (66 words) - 11:45, 11 January 2010
- {{r|Public key infrastructure}}557 bytes (70 words) - 11:45, 11 January 2010
- ...ographic techniques such as [[Diffie-Hellman]]. In some cases, an entire [[public key infrastructure]] may be involved.3 KB (459 words) - 05:49, 8 April 2024
- {{r|Public key infrastructure}}678 bytes (84 words) - 15:58, 11 January 2010
- The encryption alone does not make a complete system. [[Public key infrastructure]] is necessary, which consists of a set of services for generating the key ...l signature schemes. Digital signatures are central to the operation of [[public key infrastructure]]s and to many network security schemes ([[Transport Layer Security|SSL/TLS8 KB (1,233 words) - 05:48, 8 April 2024
- *[[Public key infrastructure|Public Key Infrastructure]] (PKI), PKCS, KEYPROV (CT-KIP, DSKPP), EKMI4 KB (577 words) - 12:36, 20 August 2010
- ...blic keys through DNS, rather than through a [[Public key infrastructure | Public Key Infrastructure]].7 KB (1,137 words) - 05:56, 11 December 2009
- ...C3303, p.2 </ref> While digital signature mechanisms do not require a full Public Key Infrastructure, such mechanisms do require a certain amount of trusted infrastructure.13 KB (2,037 words) - 16:22, 30 March 2024
- ...s [[Kerberos]] can manage authentication and keying for many machines, a [[public key infrastructure]] may help (though it also brings its own complications), and a few strateg ...igned to avoid any requirement for [[digital certificate]]s or a complex [[public key infrastructure]]; if you have the authority for the reverse map of an address range, then14 KB (2,265 words) - 05:49, 8 April 2024
- See also the next two sections, "Digital certificates" and "Public key infrastructure". === Public key infrastructure ===52 KB (8,332 words) - 05:49, 8 April 2024
- ...mic update]], use of the DNS as a data base in [[public key infrastructure|Public Key Infrastructure (PKI)]] for general security, [[Domain Name System security]] ([[DNSSEC]])38 KB (6,049 words) - 06:54, 27 August 2013