Wednesday, January 16, 2008

Public/private key, Digital Signature, Fingerprints






3 comments:

Neetu said...

nice

Tee Chess said...

Excellent post. You have explained the technical aspect of digital signature scheme in the above images. Each image explains a lot about this authentication scheme. After looking at them one can clearly understand the overall concept easily. Thanks.
public key infrastructure

Pankaj Nagla said...

igmGuru: We are one of the finest Online Training Company you can ever come upon solely focused and dedicated to your career development. We have partnered with several well-known companies and prestigious institutions and individuals to train the next generations in IT technologies. Our aim objective is to foster the best growth and upgrade your career objectives with proper knowledge and skills.

Mastering Iptables Firewall Course

Security of the network is the most important thing. We want security mechanisms which are easy to implement, open source, robust, flexible...