Technology, Science and Universe
Results for {phrase} ({results_count} of {results_count_total})
Displaying {results_count} results of {results_count_total}
x
- X.509 Validity Period Description: The Validity Period in an X.509 certificate indicates the time frame during which the certificate is valid. This period is defined(...) Read more
- X.509 Revocation Description: Revocation in X.509 refers to the process of invalidating a certificate before its expiration. This mechanism is fundamental in(...) Read more
- X.509 Trust Anchor Description: A Trust Anchor in X.509 is a known and trusted certificate used to establish a chain of trust. This concept is fundamental in(...) Read more
- X.509 Certificate Policy Description: A Certificate Policy in X.509 defines the rules for the issuance and management of digital certificates within a Public Key(...) Read more
- X.509 Path Validation Description: X.509 Path Validation is the process of verifying the trustworthiness of a chain of certificates. This process is fundamental in(...) Read more
- X.509 Certificate Signing Request Description: A Certificate Signing Request (CSR) is a message sent to a certificate authority to request a digital certificate. This process is(...) Read more
- X.509 Subject Alternative Name Description: The Subject Alternative Name (SAN) is an extension in X.509 certificates that allows additional identities to be associated with(...) Read more
- X.509 Key Encipherment Description: X.509 Key Encryption is an extension of key usage in X.509 certificates, which are standards used in public key infrastructure(...) Read more
- X.509 Digital Signature Description: The X.509 Digital Signature is an extension of key usage in X.509 certificates that allows the public key to be used for signature(...) Read more
- X.509 Certificate Chain Description: An X.509 Certificate Chain is a sequence of certificates where each certificate is signed by the next one. This model is(...) Read more
- XAuth Description: XAuth is an extension of the authentication protocol used in virtual private networks (VPNs) that allows for more secure and(...) Read more
- X.500 Authentication Description: X.500 authentication is a directory services-based authentication method that enables the management and access to information(...) Read more
- X.25 Packet Layer Protocol Description: The X.25 Packet Layer Protocol is used for communication in packet-switched networks. This protocol defines a set of rules and(...) Read more
- X.400 Message Transfer Agent (MTA) Description: An X.400 Message Transfer Agent (MTA) is a software application designed to transfer electronic messages from one computer to(...) Read more
- X.21 Data Link Layer Description: The X.21 Data Link Layer is a standard for synchronous data transmission in telecommunications. This protocol is primarily used in(...) Read more