The process by which two parties can exchange keys over an unsecure medium is called a_______ protocol.
a) key-exchange.
b) key-agreement.
c) public-key.
d) None of the above.
b) key-agreement.
Computer Science & Information Technology
You might also like to view...
A quad-core processor in a laptop is an example of ________ processing
Fill in the blank(s) with correct word
Computer Science & Information Technology
Lily asks you if it is possible to sort the records in her table first by state, then by Zip code. What will you tell her?
What will be an ideal response?
Computer Science & Information Technology