Login / Signup

Internet X.509 Public Key Infrastructure LDAPv2 Schema.

Sharon BoeyenTim HowesPatrick Richard
Published in: RFC (1999)
Keyphrases
  • public key infrastructure
  • security mechanisms
  • data model
  • public key
  • databases
  • digital signature
  • database
  • key technologies
  • database systems
  • low cost
  • intrusion detection
  • resource constrained
  • public key cryptography