The following pictures present a sample L&C use scenario,  iPAQ (Alice) authenticating an un-attended target device/PC (Bob). (1)
shows the connection initialization and the key exchange and verification type selection. In (2), the devices, having already exchanged
DH public keys,  Alice plays Bob's public key MadLib on his device. In (3), Alice plays Bob's MadLib on her device. Finally, (4) shows  the
devices after they have agreed on a shared secret.

picture_2

Picture 1. Connection initialization, key exchange protocol and verification type selection. 
                                                                                                             

picture_2

Picture 2 Having already exchanged DH public keys, Alice causes Bob to vocalize its public key MadLib.


picture_2

Picture 3Alice vocalizes Bob's public key MadLib on her device
                                                                                                             



picture_2

Picture 4. The devices have agreed on a shared secret