Q. Today, many Internet businesses and users take advantage of cryptography based onthis approach. (Solved)
1. Public key infrastructure
2. Output feedback
3. Encrypting File System
4. Single sign on
- a. Public key infrastructure
1. Public key infrastructure
2. Output feedback
3. Encrypting File System
4. Single sign on