Figure 5: Client authenticator.
Back to Article