equal
deleted
inserted
replaced
64 \begin{figure}[t] |
64 \begin{figure}[t] |
65 \begin{center} |
65 \begin{center} |
66 \includegraphics[scale=0.15]{../pics/rsa_attack_eng.jpg} |
66 \includegraphics[scale=0.15]{../pics/rsa_attack_eng.jpg} |
67 \end{center} |
67 \end{center} |
68 \caption{From a dodgy webpage about modern car theft. Note the |
68 \caption{From a dodgy webpage about modern car theft. Note the |
69 stylish attackers Malice and Mallet.\label{rsa}} |
69 stylish attackers.\label{rsa}} |
70 \end{figure} |
70 \end{figure} |
71 |
71 |
72 |
72 |
73 But there are many more such protocols we like to study. |
73 But there are many more such protocols we like to study. |
74 Another example is Wifi---you might sit at a Starbucks and |
74 Another example is Wifi---you might sit at a Starbucks and |