At the end of section 6 we first describe secrecy including an example, and then give the abstract lemmas for the authentication hierarchy including honesty requirements. It would be very helpful to add at least one (or possibly differentiating) example theory that uses these actions.
At the end of section 6 we first describe secrecy including an example, and then give the abstract lemmas for the authentication hierarchy including honesty requirements. It would be very helpful to add at least one (or possibly differentiating) example theory that uses these actions.