Security without Obscurity
![Security without Obscurity](/image/97/80/36/76/58/64/9/9780367658649.webp)
Most books on public key infrastructure (PKI) seem to focus on asymmetric cryptography, X.509 certificates, certificate authority (CA) hierarchies, or certificate policy (CP), and certificate practice statements. While algorithms, certificates, an...