Digital signatures are an effective control method for information exchange over an insecure network because they:
A. enable nonrepudiation.
B. are under the sole custody of the receiver.
C. are constant over time.
D. authenticate the user biometrically.
A. enable nonrepudiation.
B. are under the sole custody of the receiver.
C. are constant over time.
D. authenticate the user biometrically.