Key Management
Can be central, using certification authority
Can be distributed, using a "web of trust"
Previous slide
Next slide
Back to the first slide
View Graphic Version