1 |
Asymmetric keysTwo related keys, a public key and a private key, that are used to perform complementary operations, such as encryption and decryption or signature generation and signature verification.
|
2 |
Asymmetric keysA pair of encryption keys, composed of one public key and one private key. Each key is one way
|
<< Access control system format | Biometric reference data >> |