In 1976, Whitfield Diffie and Martin Hellman, researchers at Stanford University, developed_______ to solve the problem of exchanging keys securely.

a) public-key cryptography.
b) symmetric-key cryptography.
c) private-key cryptography.
d) None of the above.


a) public-key cryptography.

Computer Science & Information Technology

You might also like to view...

A(n) ____ guides you through the installation process.

A. setup module B. install module C. Automatic Update D. portable application

Computer Science & Information Technology

What is the value in n after line 4 is run?

``` 1 string s, t; 2 s = “Get up and go to school!”; 3 t = “NO!”; 4 int n = s.size(); 5 int w = s.at(3); 6 int x = s.at(12); 7 s += t; 8 cout << s; ``` A. 23 B. 24 C. 3 D. -1

Computer Science & Information Technology

A(n) _____ file contains the object that is displayed in the destination file.

A. source B. object C. beginning D. completed

Computer Science & Information Technology

When setting up a network, which of the following is the suggested order for turning on equipment?

A) Broadband modem, computers, router, and TVs B) Router, computers, TVs, and broadband modem C) Broadband modem, router, computers, and TVs D) Router, broadband modem, TVs, and computers

Computer Science & Information Technology