2000-04-12 04:00:00
mitre
PUBLISHED
The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.