What alternative term can be used to describe asymmetric cryptographic algorithms?

A. user key cryptography
B. public key cryptography
C. private key cryptography
D. cipher-text cryptography

Answer: B

Computer Science & Information Technology

You might also like to view...

Computer forensics examiners have two roles: fact witness and ____ witness.

A. professional B. direct C. discovery D. expert

Computer Science & Information Technology

In terms of complexity, what is the average case for an insertion sort?

A. linear B. quadratic C. exponential D. logarithmic

Computer Science & Information Technology