Figure 5: Client authenticator.

Back to Article