PKI Justifications
Explicit data-authentication
Non-repudiation
Strong
Weak
Key distribution
Implementation issues
Previous slide
Next slide
Back to first slide
View graphic version