4 min read
Cryptographic Key Management Policy: a layered approach
This article discusses the functions and use of hierarchical layers when establishing a cryptographic key management policy, and how the policy...
4 min read
This article discusses the functions and use of hierarchical layers when establishing a cryptographic key management policy, and how the policy...
3 min read
This article discusses the necessary exchange of information between entities within a security domain and other entities outside of the security...
4 min read
Trusted Service Manager (TSM) is a relatively new role required in a mobile Near Field Communication (NFC) ecosystem. The core services a Trusted...