V
Q. Public key cryptography also called as
- Correct Answer - Option(A)
- Views: 42
- Filed under category Information Cyber Security
No solution found for this question.
Add Solution and get +2 points.
You must be Logged in to update hint/solution
Be the first to start discuss.
Related Posts
Q. In AES in which Round Subkeys are Generated from Original key for each round?
Q. Hash function is used for________
Q. attack is when original data is modified and malicious data is inserted
Q. When integrity is lacking in a security system, occurs.
Q. RSA algorithm is best example of
Q. In cryptography, the order of the letters in a message is rearranged by __________
Q. The full form of OSI is OSI model .
View All Posts
Question analytics

Discusssion
Login to discuss.