The sender uses the public key of the recipient in ________.

A. public key encryption for authentication
B. public key encryption for confidentiality
C. public key encryption for integrity
D. public key encryption for non-repudiation

B. public key encryption for confidentiality

Computer Science & Information Technology

You might also like to view...

The distance between lines of text in a paragraph

a. Spacing before b. Spacing after c. Line spacing

Computer Science & Information Technology

Which of the following is NOT a consideration when purchasing memory?

A) Processor speed B) Front-side bus speed C) Column Access Strobe latency D) Capacity

Computer Science & Information Technology