{ "name": "Session key distribution schemes", "order": 29, "challenges": [ { "id": "59a5801209a6acac5983b694", "title": "The Needham-Schroeder(NS) Scheme", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b278", "title": "The Denning-Sacco Attack on the NS scheme", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b279", "title": "Kerberos", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b280", "title": "The Bellare-Rogaway scheme", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] } ] }