What alternative term can be used to describe asymmetric cryptographic algorithms?
A. user key cryptography
B. public key cryptography
C. private key cryptography
D. cipher-text cryptography
Answer: B
Computer Science & Information Technology
You might also like to view...
Computer forensics examiners have two roles: fact witness and ____ witness.
A. professional B. direct C. discovery D. expert
Computer Science & Information Technology
In terms of complexity, what is the average case for an insertion sort?
A. linear B. quadratic C. exponential D. logarithmic
Computer Science & Information Technology