____ is used to identify the creator of information.
(a) Integrity authentication
(b) Source authentication
(c) Integrity authorization
(d) Source authorization
The question was posed to me in homework.
My question comes from Hardware Architecture topic in division Software Defined Radio Architecture of Cognitive Radio