In e-commerce, some cryptographic tools can be used to assure that parties to the transaction are authentic, so that they cannot later deny having participated in a transaction, a feature often called ____________________.
Fill in the blank(s) with the appropriate word(s).
nonrepudiation
You might also like to view...
All of the following are TRUE about VBA procedures EXCEPT:
A) If a Sub procedure is to run when a workbook opens or a worksheet becomes active, then it is typically stored in the workbook or worksheet object to take advantage of the Procedure menu at the top of the Code window. B) Three primary types of procedures are supported by VBA. C) You can have zero or hundreds of Sub procedures and functions written within a single module. D) Function procedures are often used to create custom functions that can be entered in worksheet cells.
Which is a type of cell phone attack in which the attacker's phone appears to be a legitimate roaming cell phone?
a. Cell phone cloning b. Tumbling c. Eavesdropping d. Bluejacking