Information Security - Exam 2016 May

Spørsmål #81

When assessing the security of a key establishment protocol such as the Needham–Schroeder protocol, we assume that an attacker is able to:

Funnet en feil? Rediger spørsmålet

-
Poeng: 0/0 (0%)
Combo: 0
Spørsmål: 0/150