A trusted middle party authenticates the public keys of two other parties attempting to
communicate. What term is used to describe this?
A.
Triumvirate security
B.
Third-party algorithms
C.
Adjudication
D.
Encapsulation
A trusted middle party authenticates the public keys of two other parties attempting to
communicate. What term is used to describe this?
A trusted middle party authenticates the public keys of two other parties attempting to
communicate. What term is used to describe this?
A.
Triumvirate security
B.
Third-party algorithms
C.
Adjudication
D.
Encapsulation