Short Answer
X.509 is based on the use of public-key cryptography and __________ .
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q29: _ are often used to limit the
Q30: A certification authority is an authority trusted
Q31: For symmetric encryption to work the two
Q32: For end-to-end encryption over a network, manual
Q33: Because of the efficiency of public-key cryptosystems,
Q35: A _ generates and distributes session keys.
Q36: A _ consists of a public key,
Q37: the certificate extensions fall into three main
Q38: _ is the process of administering or
Q39: Several techniques have been proposed for the