0 votes
in Ethical Hacking by
As an application of cryptography, digital Signatures and MACs can be used for_____________.

(1)Authentication

(2)Confidentiality

(3)Integrity

(4)Availability

1 Answer

0 votes
by
Authentication
...