Modelling and Verifying a security protocol in Dafny

后端 未结 0 1633
执笔经年
执笔经年 2020-11-22 06:06

I use an example to specify my questions. This example first models the simplified NS key exchange protocol. Among them, the communication steps of the protocol are as follo

相关标签:
回答
  • 消灭零回复
提交回复
热议问题