Research Article

ESSM: Formal Analysis Framework for Protocol to Support Algebraic Operations and More Attack Capabilities

Figure 3

The path for legal agent to obtain shared key.