Security Protocol's Extended Horn Logic Model and Its Verification Method.
⇑ Translate the sentence above by Google ⇑
Related: protocol
Prev: While SIP is a request-response protocol, there is not necessarily only one response to every one request.
Next: Were the seating arrangements for the dinner party according to protocol?