Two methods of encryption
Single-key (symmetric-key) cryptography
Public/Private-key (asymmetric-key) cryptography
Previous slide
Next slide
Back to first slide
View graphic version
Author
|
Title
|
Tracks
|
Home
Send email to Interex
or to the
Webmaster
©Copyright 1998
Interex
. All rights reserved.