454823.fig.002
Figure 2: Man-in-the-middle attack in Chen et al.'s protocol.