network security
Title: network security
Category: /Science & Technology
Details: Words: 2810 | Pages: 10 (approximately 235 words/page)
network security
Category: /Science & Technology
Details: Words: 2810 | Pages: 10 (approximately 235 words/page)
showed first 75 words of 2810 total
You are viewing only a small portion of the paper.
Please login or register to access the full copy.
Please login or register to access the full copy.
showed last 75 words of 2810 total
for example IT-Centre. (http://www.8j.net/local_forms/passwd.html)
Appendix C
"Public keys are a common use of asymmetric keys. Though secret keys are easy enough to implement between two users, what if we need to contact many different users, and all of the messages need to be encrypted? It is inefficient to call each person, and make up a new secret key, for each transmission. These calls also jeopardise key security". (Beyda, 1996)