A _________ protects against an attack in which one party generates a message for another party to sign.
A. data authenticator
B. strong hash function
C. weak hash function
D. digital signature
B. strong hash function
Computer Science & Information Technology
You might also like to view...
Most peripherals are connected through USB ports
Indicate whether the statement is true or false
Computer Science & Information Technology
Alice 3 provides an installation wizard for Windows and MacOS systems.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
With ____ web publishing, the HTML document is a snapshot of the data.
A. dynamic B. optimized C. extensible D. static
Computer Science & Information Technology
Before users can be given access to a computer and its data, they must in some way prove that they are who they claim to be.This process of providing proof is known as ____.
A. authorization B. encryption C. cryptography D. authentication
Computer Science & Information Technology