Author:Lukell, S A; Hutchison, A C MDate:2003Security protocols make use of cryptographic techniques to achieve goals such as confidentiality, authentication and integrity. However, the fact that strong cryptographic algorithms exist does not guarantee the security of a communications ...Read more