Security Techniques
Encryption / Decryption for confidentiality
Digital Signatures for authenticating the identity of the sender and the integrity of the data
Previous slide
Next slide
Back to first slide
View graphic version
Author
|
Title
|
Tracks
|
Home
Send email to Interex
or to the
Webmaster
©Copyright 1998
Interex
. All rights reserved.