This article discusses the use of cryptographic technology to ensure computer security. Approaches to computerized encryption including secure function evaluation (SFE) and public key encryption (PK). The use of these technologies to control the flow of personal data and authenticate Internet transactions is described. INSETS: Computing Together;Concealing Content;Signing a Message;Hiding Connections/ Showing You Belong without Saying Who You Are
© 2001-2024 Fundación Dialnet · Todos los derechos reservados