The ____________ protocol enables two users to establish a secret key using a public-key scheme based on discrete logarithms.
A. Micali-Schnorr
B. Elgamal-Fraiser
C. Diffie-Hellman
D. Miller-Rabin
C. Diffie-Hellman
Computer Science & Information Technology
You might also like to view...
________ is a technique that involves breaking a program into logical segments and keeping only the currently needed segment in memory at any one time.
a) Caching b) Swapping c) Dynamic programming d) Creating overlays
Computer Science & Information Technology
After creating a new database from Blank desktop database, Access opens a blank table named Table1
Indicate whether the statement is true or false
Computer Science & Information Technology
Open-source tools, like PhoneGap, are free to buy and use.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
A network ________ is another name for a network interface card
Fill in the blank(s) with correct word
Computer Science & Information Technology