Figure 7.

Attack against a subsequent resolution.

Engel et al. EURASIP Journal on Information Security 2012 2012:2   doi:10.1186/1687-417X-2012-2
Download authors' original image