roblerovictoria roblerovictoria
  • 24-03-2021
  • Computers and Technology
contestada

A mathematical process of coding information so that only the intend user can read it

Respuesta :

tonb
tonb tonb
  • 24-03-2021

Answer:

asymmetric encryption with the intended user's public key.

Explanation:

Only that user will be able to decrypt the information.

Answer Link

Otras preguntas

among all the rectangles whose perimeters are 100 ft, find the dimensions of the one with maximum area
Calculate the Energy (E) in joules for that wavelength and record it in the table below. Remember that E = HF, where h the Planck constant (6.6 *10^-34 j*s)
Pete is 15 years old.This is 6 years younger than his sister Victoria. Write an equation to find Victoria's age?
a box of uncooked spaghetti cost $0.1369 per ounce. how much is this cost to the nearest cent?
How do u figure out the height of a regtangluar prism the volume is 455 and the leght Is 10 and the witch is 7
Jefferson's ideas about inalienable rights were adapted from the ideas of
is 1.5 liters equal to 15 milliliters
what is different about synthesis of the lagging strand compared to synthesis of the leading strand
what is y+4+3(y+2)=?
True or false: animals contribute most of the organic remains that form humus