elvin.org | |||||||||||||||||||||||||||||||||
The Elvin client protocol supports an extensible security model, where
the format and use of keys is determined by a scheme identifier within
the KeyBlock. Implementors seeking registration of key schemes should contact registrar@elvin.org to coordinate specification (in case there are multiple overlapping proposals), and ultimately submit the specification for registration and publication.
|
|||||||||||||||||||||||||||||||||
Copyright © 2002-2019 webmaster@elvin.org Last updated: 24 March 2019 |