...choose
For notational convenience, we use sometimes the operator to represent a general n-ary (or even infinitary) sum operator.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...algorithm
We are not interested in analyzing possible attacks to this algorithm, so we do not specify it in detail.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...operator.
The semantics of the restriction operator on a channel name a ensures that such a channel is perfectly'' secure, i.e., no other process outside its scope can communicate through channel a with processes syntactically located inside its scope.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.