CS2107 - Lecture 6: PKI + Channel security

Public key distribution PKC-based method to assure the authenticity of the downloaded program: The developer signed the file using his private key A user who has downloaded the file from unverified source can verify the authenticity of the file using the developer’s public key [Read More]

CS3230 - Lecture 6: Linear sorting

Comparison based sorting lower bound Suppose we don’t know anything about the content of the input elements we want to sort The only reasonable operation we can do to arrange in sorted order is to compare ai and aj for some i and j View any comparison based sorting algo... [Read More]