Return to Article Details Cryptographic protocol to data exchange in hostile machines Download Download PDF