Hafeez Bana (hafhat@cs.rmit.edu.au)
Sat, 22 Aug 1998 10:17:50 +1000 (EST)
Hello,
1) I have just been going through an old issue of BYTE magazine and it
describes the CyberCash Cybercoin protocol.It describes that this method
uses Secret Keys that are issued to a user when he signs up - which are
used in hash value computations in subsequent transactions.My Question
is
- If the keys are stored on the user machines.How do they (cyber
cash) make sure that a malicious program that the user has
installed will not gain access to the keys
2) Are there any sites that give detailed information on how:
- SSL is implemented
- How a certificate via a CA is implemented
Thanks in advance,
Yours Sincerely,
Hafeez Bana.
The following archive was created by hippie-mail 7.98617-22 on Sat Apr 10 1999 - 01:11:00