A security company is generating passcodes to access lockers across a country using an algorithm G. This approach primarily aims to enhance:
a) Access control
b) Encryption protocols
c) Authentication mechanisms
d) Intrusion detection systems

Q&A Platform for Education
Platform Explore for Education