in network security you can maintain non-repudiation by using?
Answers
Answered by
0
Answer:
Non-repudiation Techniques
Techniques would include email tracking. Cryptographic hash functions may be used to establish the integrity of transmitted documents. No encryption keys are involved, and strong hash functions are designed to be irreversible
Explanation:
hope my answer help you
and happy diwali
Similar questions