The sender uses the public key of the recipient in ________.
A. public key encryption for authentication
B. public key encryption for confidentiality
C. public key encryption for integrity
D. public key encryption for non-repudiation
B. public key encryption for confidentiality
Computer Science & Information Technology
You might also like to view...
The distance between lines of text in a paragraph
a. Spacing before b. Spacing after c. Line spacing
Computer Science & Information Technology
Which of the following is NOT a consideration when purchasing memory?
A) Processor speed B) Front-side bus speed C) Column Access Strobe latency D) Capacity
Computer Science & Information Technology