Change One Message In Protocol Of Fig

Change one message in protocol of Fig. 8-34 in a minor way to make it resistant to the reflection attack. Explain why your change works.

Posted in Uncategorized