Article
Figure 1
Figure 2
sep2004.tar
Figure 1
The exchanges that take place during authentication using the Kerberos protocol.