Is Hierarchical Public-Key Certification the Next Target For Hackers?
Considering alternatives to hierarchical authentication structures that are not sufficiently secure for communication on open networks such as the Internet.
Is Hierarchical Public-Key Certification the Next Target For Hackers?
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get Involved