Computer Science, asked by umairashraf026, 4 months ago

in network security you can maintain non-repudiation by using?

Answers

Answered by mustafa1366
0

Answer:

Non-repudiation Techniques

Techniques would include email tracking. Cryptographic hash functions may be used to establish the integrity of transmitted documents. No encryption keys are involved, and strong hash functions are designed to be irreversible

Explanation:

hope my answer help you

and happy diwali

Similar questions