Defending against attacks: Simulation and working of Kerberos protocol for mutual authentication
Which of the following statements is TRUE about the Kerberos protocol?
Which of the following is NOT a component of the Kerberos protocol?
In Kerberos, the client sends a to the key distribution centre to access a certain resource.