FTAA Joint Public-Private Sector Committee of Experts
... the transformation of data in order to hide its information content, establish its authenticity,
prevent its undetected modification, its repudiation and unauthorized use. It can be used to
protect the confidentiality of data whether in storage or in transit. A variety of applications have
been deve ...