patriciamoabelo1652 patriciamoabelo1652 17-12-2022 Computers and Technology contestada alice sends an e-mail that she encrypts with a shared key, which only she and bob have. upon receipt bob decrypts the email and reads it. this application is an example of