Tag

PKI

0 views collected around this technical thread.

360 Tech Engineering
360 Tech Engineering
Apr 9, 2021 · Blockchain

Understanding Consortium Chains and Hyperledger Fabric's Admission Mechanism

This article compares consortium (alliance) chains with public chains, explains why consortium chains are favored in enterprise scenarios, and details Hyperledger Fabric's admission mechanism, including MSP identity, channel architecture, and member management, supported by diagrams and practical examples.

BlockchainHyperledger FabricMSP
0 likes · 11 min read
Understanding Consortium Chains and Hyperledger Fabric's Admission Mechanism
Selected Java Interview Questions
Selected Java Interview Questions
Jan 23, 2021 · Information Security

Overview of Cryptographic Techniques: Symmetric, Asymmetric, Hash Functions, and Key Exchange

This article provides a comprehensive introduction to cryptographic techniques, covering the goals of confidentiality, integrity and authentication, and detailing symmetric, asymmetric and hash algorithms, common implementations, their advantages and drawbacks, as well as key exchange methods and public key infrastructure.

PKISymmetric Encryptionasymmetric encryption
0 likes · 16 min read
Overview of Cryptographic Techniques: Symmetric, Asymmetric, Hash Functions, and Key Exchange
Efficient Ops
Efficient Ops
Feb 19, 2020 · Information Security

How HTTPS Secures Web Traffic: Encryption, PKI, and Certificate Chains Explained

This article explains how HTTPS protects data through encryption and identity authentication, describes symmetric and asymmetric algorithms, outlines PKI and certificate issuance processes, demonstrates Nginx certificate deployment, and shows how trust chains and cross‑certificates ensure reliable secure connections.

Cross CertificateEncryptionHTTPS
0 likes · 14 min read
How HTTPS Secures Web Traffic: Encryption, PKI, and Certificate Chains Explained
Efficient Ops
Efficient Ops
Dec 11, 2019 · Information Security

Why HTTPS Certificate Revocation Still Fails: CRL, OCSP, and Modern Browser Challenges

This article explores how HTTPS certificates are validated, why revocation mechanisms like CRL and OCSP often fall short, compares browser implementations, and discusses practical mitigation techniques such as OCSP stapling and Must‑Staple to improve TLS security.

CRLHTTPSOCSP
0 likes · 19 min read
Why HTTPS Certificate Revocation Still Fails: CRL, OCSP, and Modern Browser Challenges
Architects Research Society
Architects Research Society
Apr 30, 2017 · Information Security

Key Insights from RSA 2016: Emerging IoT Security Trends and Predictions

The 2016 RSA Conference in San Francisco highlighted IoT as the top security trend, with experts discussing the shift from observation to solutions, the rise of PKI, chip‑to‑cloud protection, regulatory impacts, ransomware threats, and the potential of blockchain to manage massive IoT data challenges.

BlockchainConnected DevicesCyber Threat Intelligence
0 likes · 9 min read
Key Insights from RSA 2016: Emerging IoT Security Trends and Predictions
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
Jan 22, 2016 · Information Security

Understanding SSL/TLS Certificates, CAs, and PKI: Types, Generation, History, and Security Practices

This article explains the fundamentals of server certificates, private keys, and certificate authorities, classifies DV/OV/EV certificates, describes how to generate and inspect them, outlines CA history and notable incidents, and discusses PKI security measures such as HPKP and Certificate Transparency.

CACertificatesHTTPS
0 likes · 12 min read
Understanding SSL/TLS Certificates, CAs, and PKI: Types, Generation, History, and Security Practices