Public Key Infrastructure
This article was originally published in 2002. As businesses look to conduct more and more commerce across networks, the challenge of replacing tried and true “real world” mechanisms that provide […]
Regarding the topic of information security, or perhaps physical security
This article was originally published in 2002. As businesses look to conduct more and more commerce across networks, the challenge of replacing tried and true “real world” mechanisms that provide […]
This article was originally published in 2001. Of all the network security concepts (confidentiality, authentication, integrity, authorization, non-repudiation, availability, and policy), authentication is arguably the most important. While some applications […]