Research Article

Security-Oriented Network Architecture

Figure 3

Authenticity verification procedure.