Research Article

A General Scheme for Information Interception in the Ping-Pong Protocol

Figure 3

A schematic diagram of an individual attack.