Why is there no explicit authentication in the protocol in figure 8.19? is authentication needed? why?

Solved
Show answers

Ask an AI advisor a question