Research Article
Scrutinizing the Vulnerability of Ephemeral Diffie–Hellman over COSE (EDHOC) for IoT Environment Using Formal Approaches
| Notation | Meaning |
| | R believes that message M is true | | R receives message M at any point in time | | R previously sent message M | | R has jurisdiction over M | | M is fresh | | S is a secret key shared between M and N | | S is R’s public key | | S is a secret that R and I share | | M is a message encrypted with a key K | | M is combined with V |
|
|