List of questions
Related questions
Question 78 - 212-82 discussion
Omar, an encryption specialist in an organization, was tasked with protecting low-complexity applications such as RFID tags, sensor-based applications, and other IbT-based applications. For this purpose, he employed an algorithm for all lower-powered devices that used less power and resources without compromising device security.
identify the algorithm employed by Omar in this scenario.
A.
Quantum cryptography
B.
Elliptic curve cryptography
C.
Lightweight cryptography
D.
Homomorphic encryption
Your answer:
0 comments
Sorted by
Leave a comment first