Examveda

The authentication to be affected by use of asymmetric Crypto system and hash function is known as

A. public key

B. private key

C. digital key

D. e-governance

Answer: Option C


This Question Belongs to Commerce >> Legal Aspects Of Business

Join The Discussion

Related Questions on Legal Aspects of Business