Login / Signup
Internet X.509 Public Key Infrastructure LDAPv2 Schema.
Sharon Boeyen
Tim Howes
Patrick Richard
Published in:
RFC (1999)
Keyphrases
</>
public key infrastructure
security mechanisms
data model
public key
databases
digital signature
database
key technologies
database systems
low cost
intrusion detection
resource constrained
public key cryptography