Next:
Model
Up:
LOTOS specification
Previous:
Public-key encryption and signature
The intruder
Model
Specification of the intruder