Research Article

Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method

Table 16


::=
(Encryption Function)
(Signature Function)
(Pair Function)
(First Function)
(Second Function)
(Hash Function)