5.1.5. Needham-Schroeder Scheme, Kerberos Protocol Verbal Notes | Cryptography BSC-CSIT | TU | TABFlux