reshmakumar310 reshmakumar310 21-04-2024 Computers and Technology Answered Consider the ‘forward search attack’ using Alice and her stockbroker Bob as an example. What is another possible solution if a session key is not used?