Research Article
ESSM: Formal Analysis Framework for Protocol to Support Algebraic Operations and More Attack Capabilities
| Symbol | Specification |
| Agent | Roles involved in protocol operation | | Long term symmetric keys of principals A and B | | Long term public key of subject a | | Long term private key of principal a | | Encrypt data x with key K | | Connection of data a and B | | Protocol intruder |
|
|