Sunday, May 19, 2013

How can asymmetric encryption be used to establish identity? [closed]

How can asymmetric encryption be used to establish identity? [closed]

I was just wondering if someone could help me out. I was just looking through past paper exams to prepare me for the next exam. This question came up. Could someone please explain this to me? Much Appreciated.

No comments:

Post a Comment