infrastructure is needed to provide authentication, confidentiality and access control. Security has evolved from a basic password scheme to a
complex key infrastructure. Initially, shared secret keys were exchanged and maintained between pairs of correspondents. However, as the Internet expanded, this method became impractical. Today, a powerful public-private key technology (PKI or Public Key Infrastructure) has evolved to solve this problem.
Download the paper in PDF format here.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.