A.Private Key Intrusion B.Public Key Intrusion C.Private Key Infrastructure D.Public Key Infrastructure
A.密碼 B.密文 C.子密鑰 D.密鑰
A.2 B.3 C.4 D.5