The sender uses the public key of the recipient in ________.

A. public key encryption for authentication
B. public key encryption for confidentiality
C. public key encryption for integrity
D. public key encryption for non-repudiation


B. public key encryption for confidentiality

Computer Science & Information Technology

You might also like to view...

When writing a research paper, you should consult a(n) ________ manual to be sure that you follow the writing standards for your paper

Fill in the blank(s) with correct word

Computer Science & Information Technology

To display ________ in a document, make sure that the document is expanded to display the text of the whole document

Fill in the blank(s) with correct word

Computer Science & Information Technology

Dedicated caching servers use __________ to load balance.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A line of people waiting for the bus at a bus station is an example of a real life queue.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology