The process by which two parties can exchange keys over an unsecure medium is called a_______ protocol.

a) key-exchange.
b) key-agreement.
c) public-key.
d) None of the above.

b) key-agreement.

Computer Science & Information Technology

You might also like to view...

A quad-core processor in a laptop is an example of ________ processing

Fill in the blank(s) with correct word

Computer Science & Information Technology

Lily asks you if it is possible to sort the records in her table first by state, then by Zip code. What will you tell her?

What will be an ideal response?

Computer Science & Information Technology