Research Article

Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method

Table 20

SET analysis: role of WLMV:prot.


Yes
Yes
No
AuthCode Yes