Watch this video on YouTube
Like the Kerberos protocol, SESAME is also subject to which of the following?