Public key infrastructure: Difference between revisions
From ACT Wiki
Jump to navigationJump to search
imported>Administrator (CSV import) |
imported>Charles Cresswell No edit summary |
||
Line 4: | Line 4: | ||
* [[Digital signature]] | * [[Digital signature]] | ||
* [[Secure Sockets Layer]] | * [[Secure Sockets Layer]] | ||
[[Category:Technology_and_Systems]] |
Revision as of 17:08, 18 June 2013
(PKI). Public-key infrastructure uses one or more third parties, known as certificate authorities, to certify ownership of key pairs to prove that a public key is authentic, and has not been tampered with or replaced by a malicious third party.