The __________ is formed by taking the hash of the message and encrypting the message with the creator's private key.
A. timestamp
B. message digest
C. hash code
D. digital signature
D. digital signature
Computer Science & Information Technology
You might also like to view...
When using shading, the user can use the Apply to box to select the part of the document where the shading will be applied
Indicate whether the statement is true or false
Computer Science & Information Technology
A USB 2.0 port is normally __________ in color
Fill in the blank(s) with correct word
Computer Science & Information Technology