Article Figure 1 Figure 2 sep2004.tar

Figure 1 The exchanges that take place during authentication using the Kerberos protocol.