Security Techniques
Encryption / Decryption for confidentiality
Digital Signatures for authenticating the identity of the sender and the integrity of the data
Previous slide
Next slide
Back to first slide
View graphic version