Specify the asymmetric algorithm to use for key exchange for end-to-end encryption.
Discuss this page in DocCommentXchange.
|
Copyright © 2010, iAnywhere Solutions, Inc. - SQL Anywhere 12.0.0 |