Which of the following technologies can provide protection for the PKI’s escrowed keys?
seenagape
The key management organization has implemented a key escrowing function. Which of the following technologies can provide protection for the PKI’s escrowed keys?