Lecture Network security: Chapter 20 - Dr. Munam Ali Shah
Lecture Network security: Chapter 20 - Dr. Munam Ali Shah
In this chapter, we will talk about confidentiality using symmetric encryption, we will also explore link vs. end to end encryption, key distribution design constraints will be explored.