I had a question about my research that I could not solve.
Let's look at an end-to-end form that uses RSA, Alice needs one hour to send her public key to Bob and vice versa to communicate, but if someone runs an MITM, security will be null, s...
asked by
15.03.2015 / 23:04