Althoughanintruderiscapabletobreaksomeofthe(weak)authenticationstepsofaprotocol published presentations and documents on DocSlides.