ISO IEC 29128:2011 pdf – Information technology一Security techniques – Verification of cryptographic protocols. The developer shall provide information about language which is used for describe adversarial model of the target protocol. 7.2.3.3 Content and presentation elements The statement of adversarial...
Continue Reading