Which of the following involves a key exchange which introduces the vulnerability of a man-in-the-middle attack?
A. SSL
B. RSA
C. Kerberos
D. PKI
Which of the following involves a key exchange which introduces the vulnerability of a man-in-the-middle attack?
A. SSL
B. RSA
C. Kerberos
D. PKI