Cryptosystem Vulnerability to Attacks and How to Overcome Them
To enable interoperability between PKIs of different organizations, hybrid architectures can be used. Below is a comparison table of the advantages and disadvantages of these hybrid architectures. Table 4.2. Comparison of hybrid PKI architectures Architecture Advantage Defect Extended credit list ...


