Encryption. By Jepte Vergara – Benitez Bowdoin Science Experience . Question:. How does the process of encryption protect online private conversations from unwanted others?. Encryption/Decryption . Plain text: Understandable words for humans.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
•F-Secure Corporation. "Terminology." How To. F-Secure Corporation, n.d. Web. 23 Aug. 2012. <http://www.f-secure.com/en/web/labs_global/terminology-e>.
•Goodrich, Michael T., and Roberto Tamassia. "Introduction." Introduction to Computer Security. Boston: Addison-Wesley, 2011. 25-30. Print.
•Houghton Mifflin Company. The American Heritage Dictionary of the English Language. 4th ed. Boston: Houghton Mifflin, 2000. Print.
•Microsoft, Inc. "How to Encrypt a Folder in Windows XP." How to Encrypt a Folder in Windows XP. Microsoft, Inc., 14 July 2004. Web. 22 Aug. 2012. <http://support.microsoft.com/kb/308989>.
•Personal Communications, Professor Oliveira from Bowdoin College