Next:
How to use TLS in application protocols
, Previous:
Authentication methods
, Up:
Top
5 More on certificate authentication
The X.509 trust model
The OpenPGP trust model
Digital signatures