Location:
Search - PKI pdf
Search list
Description: PKI电子商务中的加密.pdf-PKI encryption of e-commerce. Pdf
Platform: |
Size: 24321 |
Author: 艰苦 |
Hits:
Description: 关于PKI的只是的pdf格式的文章,希望同志们喜欢,
Platform: |
Size: 286989 |
Author: ziyifengshen |
Hits:
Description: PKI电子商务中的加密.pdf-PKI encryption of e-commerce. Pdf
Platform: |
Size: 23552 |
Author: 艰苦 |
Hits:
Description: 关于PKI的只是的pdf格式的文章,希望同志们喜欢,-PKI is only on the pdf format of the article, I hope comrades like
Platform: |
Size: 286720 |
Author: ziyifengshen |
Hits:
Description: ASN.1/BER/DER 编码子集入门指南。PKI证书交换时常用,有助于密码系统开发。PDF文件-Encoding a subset ASN.1/BER/DER Getting Started Guide. The exchange of PKI certificates often used to help the development of cryptography. PDF document
Platform: |
Size: 415744 |
Author: 千里雪 |
Hits:
Description: A certification path is an ordered list of certificates starting with a certificate issued by the relying
party s trust root, and ending with the target certificate that needs to be validated. Certification
path validation procedures are based on the algorithm supplied in ITU-T Recommendation X.509
and further defined in Internet Engineering Task Force (IETF) Request for Comments (RFC)
3280. Certification path processing verifies the binding between the subject distinguished name
and/or subject alternative name and the subject public key defined in the target certificate. The
binding is limited by constraints, which are specified in the certificates that comprise the path,
and inputs that are specified by the relying party. To ensure secure interoperation of PKI-enabled
applications, the path validation must be done in accordance with the X.509 and RFC 3280
specifications. This document provides the test assertions and the test cases for testing path
validation software against these specifications. > Downloads > 文章/文档- > Downloads > 文章/文档
Platform: |
Size: 657408 |
Author: Jacky |
Hits:
Description: A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities
through digital certificates. A PKI includes components that issue digital certificates and
distribute certificate status information. PKI users select one or more certificate issuers as
trust anchors, and establish security services based on certificates that may be validated
using one of their trust anchors.
Platform: |
Size: 81920 |
Author: Jacky |
Hits:
Description: PKI 公共基础设施实现和管理电子安全,pdf版-PKI public infrastructure implementation and management of electronic security, pdf version
Platform: |
Size: 10249216 |
Author: 张慧 |
Hits:
Description: 一本讲述PKI系统的权威性书籍《公共基础设施PKI:实现和管理电子安全》-this is a good book
Platform: |
Size: 7593984 |
Author: 李领新 |
Hits:
Description: Wireshark is the world s foremost network protocol analyzer. It lets you capture and interactively browse the traffic running on a computer network. It is the de facto (and often de jure) standard across many industries and educational institutions.
Wireshark development thrives thanks to the contributions of networking experts across the globe. It is the continuation of a project that started in 1998.
Platform: |
Size: 123904 |
Author: junaid |
Hits:
Description: PKI/CA与数字证书技术大全.pdf扫描件
Platform: |
Size: 94677529 |
Author: 3443896565@qq.com |
Hits: