What term is used to describe this?

A trusted middle party authenticates the public keys of two other parties attempting to
communicate. What term is used to describe this?

A trusted middle party authenticates the public keys of two other parties attempting to
communicate. What term is used to describe this?

A.
Triumvirate security

B.
Third-party algorithms

C.
Adjudication

D.
Encapsulation



Leave a Reply 0

Your email address will not be published. Required fields are marked *