Why are there no connection-less transport protocols that support authentication or encryption? Assuming there were such a protocol, how
would it perform authentication validation or a cryptographic key exchange? If the cryptographic requirements were preshared, how could it
prevent replay attacks?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here