• Thumbnail for Public key infrastructure
    A public key infrastructure (PKI) is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and...
    34 KB (4,071 words) - 15:13, 29 September 2024
  • Resource Public Key Infrastructure (RPKI), also known as Resource Certification, is a specialized public key infrastructure (PKI) framework to support...
    15 KB (1,675 words) - 03:08, 2 December 2023
  • Simple public key infrastructure (SPKI, pronounced spoo-key) was an attempt to overcome the complexity of traditional X.509 public key infrastructure. It...
    4 KB (526 words) - 22:49, 29 October 2023
  • Thumbnail for Public-key cryptography
    Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a...
    36 KB (4,186 words) - 09:40, 5 October 2024
  • HTTPS, a protocol for securely browsing the web. In a typical public-key infrastructure (PKI) scheme, the certificate issuer is a certificate authority...
    49 KB (5,681 words) - 18:50, 3 September 2024
  • Wireless Public Key Infrastructure (WPKI) is a technology that provides public key infrastructure functionality using a mobile Secure Element such as a...
    854 bytes (61 words) - 14:11, 2 October 2019
  • managing digital certificates and encryption keys. Public key infrastructure X.509 Root certificate Public key certificate Certificate authority Digital...
    19 KB (1,781 words) - 14:01, 4 September 2024
  • Online Certificate Status Protocol (category Public key infrastructure)
    specifically addressing certain problems associated with using CRLs in a public key infrastructure (PKI). Messages communicated via OCSP are encoded in ASN.1 and...
    18 KB (1,796 words) - 23:34, 6 October 2024
  • Thumbnail for Certificate revocation list
    Slava; Adams, Carlisle (June 2013). "RFC 6960: X.509 Internet Public Key Infrastructure: Online Certificate Status Protocol - OCSP". Internet Engineering...
    12 KB (1,328 words) - 06:03, 19 July 2024
  • Thumbnail for HMAC
    cryptography. It trades off the need for a complex public key infrastructure by delegating the key exchange to the communicating parties, who are responsible...
    18 KB (2,335 words) - 22:48, 6 October 2024