Research Article

Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method

Table 21

A Secure version of the SET protocol.

1.
2.
3.
4. ,
     
5. ,
      
. ,
     
6.