next up previous
Next: Model Up: LOTOS specification Previous: Public-key encryption and signature

The intruder