First page
Back
Continue
Last page
Graphics
Authentication Procedures
X.509 includes
three authentication procedures
making use of public key signatures
Intended for a variety of applications
Assumes two parties know each other’s public key