The reverse of the asymmetric encryption process yields ____.
A. digital signatures
B. certificate authorities
C. DES
D. a Rijndael round
Answer: A
Computer Science & Information Technology
You might also like to view...
When you have a message that requires urgent attention, you can send the message with a(n) ____________________ level.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
A database, a physical server, and a service are examples of _________________________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology