作者: Marie-Jeanne Toussaint
关键词:
摘要: This paper shows how to derive a representation of the participants’ knowledge in cryptographic protocol. The modelization is based on assumption that underlying system perfect and an extension “Hidden Automorphism Model” introduced by Merritt. It can be used establish security protocols.