Next: The role of mathematics
Up: A Whirlwind Tour of
Previous: What is information protection?
- encryption of a conversation or file
- authentication of a conversation or file
- key exchange (public conversation to construct private data)
- electronic payments (e.g., cash, micropayments)
- proofs of knowledge
- construction by multiple parties (secret sharing)
- covert channels
- intellectual property protection
Kevin McCurley
1/23/1998