Читать книгу Security Engineering - Ross Anderson - Страница 193

5.7.6 Other public-key protocols

Оглавление

Dozens of other public-key protocols have found wide use, including the following, most of which we'll discuss in detail later. Here I'll briefly mention code signing, PGP and QUIC.

Security Engineering

Подняться наверх