Which of the following encryption schemes is the public key infrastructure based on?
A.
Quantum
B.
Elliptical curve
C.
Asymmetric
D.
Symmetric
Which of the following encryption schemes is the public key infrastructure based on?
Which of the following encryption schemes is the public key infrastructure based on?
A.
Quantum
B.
Elliptical curve
C.
Asymmetric
D.
Symmetric