Report - Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Please pass captcha verification before submit form