Jump to first page
-
125
Key exchange 3
Parental considerations 2
n
You may want to design a database that maintains
the trust information and implements your policy.
n
A key revocation procedure will probably need the
same authentication (or stronger) than the