Next:
1 Introduction
Up:
Network Application Security Using
Previous:
List of Figures
 
Contents
 
Index
List of Tables
4.1.
Update operations supported in DNS and LDAP
4.2.
Authentication support in DNS and LDAP
4.3.
Number of round trips for a query using DNS and LDAP
4.4.
Typical certificate sizes
4.5.
Overhead of various layers
4.6.
Bytes required to transfer a certificate that contains a 1024 bit RSA key with DNS and LDAP
4.7.
Queries per second to look up a certificate
5.1.
Example of (partial) DNS information for a zone josefsson.org
5.2.
Example of non-existence proof data for data in table
5.1
5.3.
Example of non-existence proof data for data in table
5.1
2002-01-07