macbre5158 macbre5158 29-02-2024 Computers and Technology contestada How can user authentication be achieved between Alice and Bob using the shared secret key k and the public hash function h?