Lecture Information systems security - Chapter 5 (part 2): Public key infrastructure
Lecture Information systems security - Chapter 5 (part 2): Public key infrastructure
The content chapter 5 (part 1) include: Preparing for cryptographic attacks, cryptography standards and protocols, key management and key life cycle, introduction of PKI, trust models, PKI management.