Which of the following concepts describes the use of a one way transformation in order to validate
the integrity of a program?
A.
Hashing
B.
Key escrow
C.
Non-repudiation
D.
Steganography
Which of the following concepts describes the use of a one way transformation in order to validate
the integrity of a program?
Which of the following concepts describes the use of a one way transformation in order to validate
the integrity of a program?
A.
Hashing
B.
Key escrow
C.
Non-repudiation
D.
Steganography