Saturday, March 5, 2011

Private Key

It involves the use of asymmetric key algorithms instead of or in symmetric key algorithms.

No comments:

Post a Comment