Report copyright - Network Security: Classic Protocol Flaws, Kerberos...Classic key-exchange protocols and flaws 4 Needham-Schroeder secret-key protocol The first secret-key key-exchange protocol 1978
Please pass captcha verification before submit form