J2ME Certificate tutorial
標(biāo)簽: Certificate tutorial J2ME
上傳時(shí)間: 2014-11-27
上傳用戶:tedo811
Examples showing the use of Certificate Revocation Lists (CRLs) and Online Certificate Status Protocol (OCSP).
標(biāo)簽: Certificate Revocation Examples showing
上傳時(shí)間: 2014-01-23
上傳用戶:www240697738
PKI(public key infrastructure) and CA(Certificate authority)
標(biāo)簽: infrastructure Certificate authority public
上傳時(shí)間: 2014-01-10
上傳用戶:nanxia
PKI(public key infrastructure) and CA(Certificate authority)
標(biāo)簽: infrastructure Certificate authority public
上傳時(shí)間: 2016-04-17
上傳用戶:lizhizheng88
creat a Certificate using makecert creat a PKCS#12.pfx file to store the private key Encrypte data using the public Key in Certificate Decrypt data using the private key in a PKCS#12.pfx file
標(biāo)簽: creat Certificate Encrypte makecert
上傳時(shí)間: 2016-10-28
上傳用戶:agent
A certification path is an ordered list of Certificates starting with a Certificate issued by the relying party s trust root, and ending with the target Certificate that needs to be validated. Certification path validation procedures are based on the algorithm supplied in ITU-T Recommendation X.509 and further defined in Internet Engineering Task Force (IETF) Request for Comments (RFC) 3280. Certification path processing verifies the binding between the subject distinguished name and/or subject alternative name and the subject public key defined in the target Certificate. The binding is limited by constraints, which are specified in the Certificates that comprise the path, and inputs that are specified by the relying party. To ensure secure interoperation of PKI-enabled applications, the path validation must be done in accordance with the X.509 and RFC 3280 specifications. This document provides the test assertions and the test cases for testing path validation software against these specifications.
標(biāo)簽: certification Certificates Certificate starting
上傳時(shí)間: 2017-07-31
上傳用戶:清風(fēng)冷雨
This is an acna book for microsoft Certificate!!language vietnamse
標(biāo)簽: Certificate microsoft vietnamse language
上傳時(shí)間: 2017-09-20
上傳用戶:希醬大魔王
由于電子商務(wù)廣泛采用公開密鑰技術(shù),職能部門有必要對公鑰加以管理。本文簡要介紹了基于PKI的密鑰托管技術(shù)及密鑰托管代理的概念,分析了密鑰托管的步驟,以及政府部門在密鑰托管代理的幫助下強(qiáng)制訪問信息的過程。 關(guān)鍵詞:密鑰托管 證書授權(quán)認(rèn)證 公開密鑰 公鑰基礎(chǔ)設(shè)施 托管證書 網(wǎng)絡(luò)的安全問題得到人們的日益重視。網(wǎng)絡(luò)面臨的威脅五花八門:內(nèi)部竊密和破壞,截收,非法訪問,破壞信息的完整性,冒充,破壞系統(tǒng)的可用性,重演,抵賴等。于是公鑰基礎(chǔ)設(shè)施(Public Key Infrastructure,PKI)應(yīng)運(yùn)而生。PKI是電子商務(wù)和其它信息系統(tǒng)的安全基礎(chǔ),用來建立不同實(shí)體間的"信任"關(guān)系。它的基礎(chǔ)是加密技術(shù),核心是證書服務(wù)。用戶使用由證書授權(quán)認(rèn)證中心(Certificate Authority,CA)簽發(fā)的數(shù)字證書,結(jié)合加密技術(shù),可以保證通信內(nèi)
上傳時(shí)間: 2013-12-18
上傳用戶:tonyshao
import java.io.FileOutputStream import java.security.KeyStore import java.security.cert.Certificate import javax.security.auth.x500.X500PrivateCredential
標(biāo)簽: import java security FileOutputStream
上傳時(shí)間: 2013-12-16
上傳用戶:GHF
flash lite開發(fā) ArcadeHeroes.swf SWF content games/invaders.swf SWF content games/pacman.swf SWF content Arcade1_2nd_edition.SIS Nokia S60 2nd Edition SIS package Arcade1_3rd_edition_signed.sis Nokia S60 3rd Edition signed SIS package Arcade1_2nd_edition.pkg Nokia S60 2nd Edition SIS Package descriptor Arcade1_3rd_edition.pkg Nokia S60 3rd Edition SIS Package descriptor makesis.php PHP script mykey.key sample Certificate key, created using makekeys.exe mycert.cer sample Certificate, created using makekeys.exe makekeys.exe Symbian application to create signing keys
標(biāo)簽: content SWF swf games
上傳時(shí)間: 2014-01-22
上傳用戶:hn891122
蟲蟲下載站版權(quán)所有 京ICP備2021023401號-1