Specify the asymmetric algorithm to use for key exchange for end-to-end encryption.
Discuss this page in DocCommentXchange.
|
Copyright © 2012, iAnywhere Solutions, Inc. - SQL Anywhere 12.0.1 |